International Journal of Management, IT and Engineering

  • Year: 2019
  • Volume: 9
  • Issue: 7

WSNs Prone to Swap Attacking and Eavesdropping

  • Author:
  • Shafiqul Abidin
  • Total Page Count: 9
  • DOI:
  • Page Number: 416 to 424

HMRITM (Affiliated with GGSI P University), Delhi, India

Online published on 24 October, 2019.

Abstract

This paper evaluates the nature and impact of Swap Attack and Eavesdropping in Wireless Sensor Network (WSNs). This shows the phenomenon of how it works at the industrial site which consists of a sink node and also contains multiple sensors, and are used in broadcasting of propagation of radio waves, the transmission from the sensor to the sink and from the sensor to the eavesdropper and the difference between these two is the secrecy capacity of the transmission through wireless mode. The transmitted data will be easily intercepted by an eavesdropper if the result or the secrecy capacity will be low or under positive or non negative resulting in the sense due to wireless fading effects as such as obstacles in machinery parts or vibrations through engines. Earlier, cryptographic techniques were used to save or prevent the coded information from eavesdropper having low computing capability but now the information can be decoded easily by the eavesdropper with having high computational capability. As such in Wireless Sensor Networks, the swap attack against Directed Diffusion, in this there are basically two nodes to be considered namely called as source node and sink node. The source node to be known from where the data are to be sent to other node and other node called as sink node where data are received. The Swap Attack works under the bad route for routing the messages. There are two modes called Norm mode and Halt mode through which swap attack is being performed whereas, in Norm mode the attacker node gets alternated between the bad and good routes in the on and off cycles whereas, in Halt mode, the attacker node can hide its Presence by putting itself in the sleep mode.

Keywords

Wireless Sensor Netorks (WSNs), Swap Attack, Eavesdropping in WSN, Cryptography Techniques