Attack on the Chaos Sensor Network Protocol
As the demand for wireless sensor networks increases the need for new protocols with specific ways of distributing data emerges. Chaos is one of those protocols. Chaos has no native security countermeasures implemented, therefore it is important to test how vulnerable it is against attacks. In this...
Main Author: | Gerbert, Oscar |
---|---|
Format: | Others |
Language: | English |
Published: |
Uppsala universitet, Institutionen för informationsteknologi
2015
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480 |
Similar Items
-
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
by: Carolina Del-Valle-Soto, et al.
Published: (2015-03-01) -
Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
by: Ohida Rufai Ahutu, et al.
Published: (2020-01-01) -
Enhanced routing protocol for graceful degradation in wireless sensor networks during attacks
by: Radhakrishnan, Preetha
Published: (2007) -
A Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
by: Yi-Chang Lee, et al.
Published: (2009) -
Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks
by: Ranjeeth Kumar Sundararajan, et al.
Published: (2015-01-01)