z-logo
open-access-imgOpen Access
Security Attacks in Wireless Sensor Networks
Author(s) -
Lalitha Bhagavathi Gurajada,
Sai Deepthi Rajaputra,
Indira Gogineni,
Riaz Shaik
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.32.15704
Subject(s) - computer science , osi model , computer security , computer network , application layer , layer (electronics) , prime (order theory) , network layer , wireless sensor network , key (lock) , network security , operating system , mathematics , combinatorics , interconnection , software deployment , chemistry , organic chemistry
In today’s world, Security is the prime concern for each application. Network security and Computer protection are the serious issues. A broad range of Wireless Sensor Networks (WSNs) applications[1][15] are widely used in military, researches etc. The key subject of computing is to provide network security several types of attacks are increasing day by day. The attacks present in different layers are produced due to the susceptibilities present in the layers. The Seven layers in OSI model are formulated to convey the information from highest layer to lowest layer. Broadcast of data gets modified according to the layer in which it lies. Individually every layer is weak to different types of attacks. This paper models about the different attacks present in each layer of OSI.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here