blog




  • Essay / Mobile Devices and Wireless Communications - 1914

    IntroductionWith the increasing popularity of mobile devices and recent developments in the field of wireless communication, wireless sensor networks are one of the future areas of interest in research point of view. Sensor networks are made up of “smart nodes” whose resources are limited in terms of memory, energy and computing power. These nodes communicate wirelessly and transmit their information to the main node generally called a receiver node or base station. These sensor nodes include their own sensors, processor, radio transceiver, energy resource, usually a battery, providing them with the capability of sensing, processing and communication. The first implementation of wireless sensor networks was in military applications, but today these networks are used in environmental applications, medical applications, home appliances, and various other commercial and consumer applications. In wireless sensor networks, sensor nodes are densely deployed and work collaboratively to monitor. the specific task and then communicate with each other or with a base station. The topology of sensor networks can range from a simple flat model to a multi-hop clustering model. These networks have low memory, low bandwidth, low consumption and large-scale node. The various other factors influencing the design of sensor networks are: fault tolerance, scalability, production costs, operating environment, hardware constraints, etc. Therefore, the design of these networks must address all these factors. However, due to the wireless nature of these networks and the absence of tamper-proof hardware, they are vulnerable to various types of attacks and these attacks are possible on almost every layer of the OSI layer. As these networks are physically weak networks, it's really paper...... or network traffic over communication channels without the knowledge of the sender and receiver. As in wireless sensor networks, wireless signals are broadcast and publicly accessible and the attacker can easily plug in between the ranges of the communication channel.3: Jamming: These types of attacks are carried out by deploying a large number of nodes that can cause intense noise. in the network and occupying the network channels making the transmission media unavailable to other nodes. These types of attacks rarely occur because these jamming devices are easily detectable because the sensor nodes detect noise that is much larger than the usual network noise. MAC layer: at this layer, the attacker tries to disrupt the different coordination rules and produces harmful noise. traffic. They also attempt to spoof identities at the MAC layer..