IIUM Repository

Investigation of techniques for combating malicious objects in unreliable wireless sensor networks

Salami, Abdulazeez F. and Bello-Salau, Habeeb and Hussaini, Mukhtar and Anwar, Farhat (2011) Investigation of techniques for combating malicious objects in unreliable wireless sensor networks. In: Research Issues in Wireless Communication Networking. IIUM Press, Kuala Lumpur, pp. 290-300. ISBN 978-967-418-149-9

PDF (Investigation of techniques for combating ) - Published Version
Download (257kB) | Preview


Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively

Item Type: Book Chapter
Additional Information: 3276/21965
Uncontrolled Keywords: Wireless sensor, networks
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Kulliyyah of Engineering
Depositing User: Prof. Farhat Anwar
Date Deposited: 22 Oct 2012 18:50
Last Modified: 30 Dec 2019 15:05
URI: http://irep.iium.edu.my/id/eprint/21965

Actions (login required)

View Item View Item


Downloads per month over past year