A viable and sustainable key management approach for a national e-health environment

Author(s):  
Pei-Yuan Shen ◽  
Vicky Liu ◽  
William Caelli

Due to the wide range of applications in public and military domains, wireless sensor network (WSN) is evolving as a popular technology. This WSN consists of a large number of sensors that are spread across a geographical area thatare self-configuring in nature. These nodes are of low cost and resource-constrained nodes. Because these reasons the network becomes vulnerable to many network attacks. There are many types of attacks among which one of the serious attacks is the sinkhole attack, which is one of the destructive routing attacks. It causes the adversary node to attract all or most of the traffic from the neighbors by broadcasting false routing updates of having the shortest path to the central station. This paper is a survey on various methods implemented to overcome sinkhole attacks like Hop Count Monitoring scheme, Key Management Approach, Message-Digest Algorithm.


Author(s):  
Shikha Rathore ◽  
Jitendra Agrawal ◽  
Sanjeev Sharma ◽  
Santosh Sahu

Sensors ◽  
2018 ◽  
Vol 18 (6) ◽  
pp. 1833 ◽  
Author(s):  
Ramon Sanchez-Iborra ◽  
Jesús Sánchez-Gómez ◽  
Salvador Pérez ◽  
Pedro Fernández ◽  
José Santa ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document