
Security of Wireless Sensor Networks: Analysis of LEAP
Versandfertig in 6-10 Tagen
26,99 €
inkl. MwSt.
PAYBACK Punkte
13 °P sammeln!
It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.