Node Compromise: Node compromise is one of the
major problems in WSNs that lead to inside attacks. It is a
kind of act by which a legitimate node in the network is
captured and compromised, that is, reprogrammed by an
adversary. In situations where it is not feasible for an
adversary to physically capture and reprogram nodes in the
network, he can use a laptop, which is more powerful in terms
of computing and radio power to communicate with sensors
and insert malicious code without moving to their locations or
physically touching them. With this, a compromised node
running malicious code disguised as a legitimate node
continuously seeks to find ways to disrupt communication and
paralyze the network. However, node compromise attack is
severe when the base node is compromised.
Node Compromise: Node compromise is one of the
major problems in WSNs that lead to inside attacks. It is a
kind of act by which a legitimate node in the network is
captured and compromised, that is, reprogrammed by an
adversary. In situations where it is not feasible for an
adversary to physically capture and reprogram nodes in the
network, he can use a laptop, which is more powerful in terms
of computing and radio power to communicate with sensors
and insert malicious code without moving to their locations or
physically touching them. With this, a compromised node
running malicious code disguised as a legitimate node
continuously seeks to find ways to disrupt communication and
paralyze the network. However, node compromise attack is
severe when the base node is compromised.
การแปล กรุณารอสักครู่..
Node Compromise: Node compromise is one of the
major problems in WSNs that lead to inside attacks. It is a
kind of act by which a legitimate node in the network is
captured and compromised, that is, reprogrammed by an
adversary. In situations where it is not feasible for an
adversary to physically capture and reprogram nodes in the
network, he can use a laptop, which is more powerful in terms
of computing and radio power to communicate with sensors
and insert malicious code without moving to their locations or
physically touching them. With this, a compromised node
running malicious code disguised as a legitimate node
continuously seeks to find ways to disrupt communication and
paralyze the network. However, node compromise attack is
severe when the base node is compromised.
การแปล กรุณารอสักครู่..