Investigation of techniques for combating malicious objects in unreliable wireless sensor networks

Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...

Full description

Bibliographic Details
Main Authors: Salami, Abdulazeez F., Bello-Salau, Habeeb, Hussaini, Mukhtar, Anwar, Farhat
Format: Book Chapter
Language:English
Published: IIUM Press 2011
Subjects:
Online Access:http://irep.iium.edu.my/21965/
http://irep.iium.edu.my/21965/
http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf
Description
Summary:Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively