Work place: University Institute of Technology, RGPV, Bhopal, 462036, India
E-mail: bhavanabutani89@gmail.com
Website:
Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Network Architecture
Biography
Bhavana Butani received his Bachelor`s degree in Information Technology, MIT, Ujjain, Indian 2010. At present she is pursuing M.E. Degree in Computer Science & Engineering from UIT-RGPV, Bhopal, India.
Her research areas are Computer Networks, Wireless Sensor network, Security Attacks in WSN. She is also working on enhancing attacking efficiency of node capture attack in WSN.
By Bhavana Butani Piyush Kumar Shukla Sanjay Silakari
DOI: https://doi.org/10.5815/ijcnis.2014.11.04, Pub. Date: 8 Oct. 2014
Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals