Abstract
WSN consists of a number of nodes and base stations and is used for event monitoring in various fields
such as war situations, forest fires, and home networks. WSN sensor nodes are placed in fields that are
difficult for users to manage. It is therefore vulnerable to attackers, and attackers can use false nodes or
MAC injection attacks through the hijacked nodes to reduce the lifetime of the network or trigger false
alarms.
Users
Please
log in to take part in the discussion (add own reviews or comments).