Security of Sensor Networks

Document Type:Thesis

Subject Area:Technology

Document 1

The architecture of the WSN adheres to the OSI model. In this case, the architecture entails three cross layers and five other layers. The five layers include the application, transport, network, data link and the physical layers. The cross layers include the task, mobility and power management planes. Sensor networks could be applied in the military, health, environmental, homes, area monitoring, air pollution, and industrial monitoring among others. Underwater wireless sensor networks have their sensor nodes placed below the water and they often encounter long propagation delay. Multimedia sensor networks have been developed so as to monitor issues related to multimedia including images, videos as well as audio. Their sensor nodes, in this case, are equipped with microphones as well as cameras.

Sign up to view the full document!

Mobile wireless sensor networks entails a group of sensor nodes that are mobile and interact with the physical surrounding at ease (Jain, 2012). They have an improved coverage and their computation of sense and communication had been effective. The incident took place between 17:21 to 17:31 UTC on the twenty-eighth day of February 2018 and the organization was able to note and regulate the DDOS threat. Autonomous systems were blamed to be the main cause of the problem and happened through several critical endpoints within the system. The Memcached based approach brought about the problem that went through the system at a very high speed. The rise of the bandwidth issue to more than 100Gbps made the organization to transport their traffic to Akamai for assistance in the capacity of the network.

Sign up to view the full document!

The links of the organization to Akamai helped to resolve the problem. The core developers of the company described the threat to Sybil attack as an aspect that was denied by the CEO. The attack, in this case, was said to happen after an individual had created majority fake identities so as to gain some influence on the peer to peer network of an organization. According to Van Der Laan, there were non-functional nodes that were inserted into the network and they never stored a block or even provided them when they requested. This had been a factor that had left the nodes that relied on them to stay waiting and finally causing a slowdown in the system. As described by the company CEO, the attack was unintended Sybil in nature and affected few parts s and finally was addressed (Swanson, 2015).

Sign up to view the full document!

The activities at Chainalysis were therefore, said to have threatened this kind of stability. Peter Todd described that the Sybil attacks had the ability to affect all the users of Bitcoin. Chainalysis denied any malicious behavior that led to deterrence in the network. In order to solve the problem, there was a need to find the IP address of the first node that led to the introduction of the new transaction within the network so as to understand the country that was using the GeoIP. There was also need to ensure that the error did not arise from an electron server. The attacks of the sensor nodes include the wormhole, Sybil attack, and black hole attacks. The application of the sensor network is to connect the internet and the LAN and WAN network enterprise.

Sign up to view the full document!

The architecture of the WSN adheres to the OSI model. In this case, the architecture entails three cross layers and five other layers. People dealing with WSNs ought to be professionals to address challenges and ensure the right information is received. (2018, April). nicter: An incident analysis system toward binding network monitoring with malware analysis. In Information Security Threats Data Collection and Sharing, 2008. WISTDCS'08. WOMBAT Workshop on (pp. , Bagga, A. , & Sobti, R. (2017, July). Evolution of bitcoin and security risk in bitcoin wallets. In Computer, Communications and Electronics (Comptelix), 2017 International Conference on (pp. 537-568 Jain A, Kant K, Tripathy M (2012) Security solutions for wireless sensor networks in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on IEEE pp: 430- 433. Yawar Abbas Bangash, Qamar ud Din Abid et al.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable