Wireless Sensor Network Security Thesis PDF
Wireless Sensor Network Security Thesis PDF
Wireless Sensor Network Security Thesis PDF
research, analysis, and critical thinking. As one delves into this complex field, they encounter
numerous challenges, including the vast amount of literature to review, the need to stay updated with
the latest advancements, and the intricacies of designing and implementing security measures.
One of the biggest difficulties in writing a thesis on this topic is the sheer volume of information
available. With the rapid pace of technological innovation, new research papers, articles, and reports
are constantly being published, making it challenging to keep up with the latest developments.
Additionally, understanding the various security protocols, algorithms, and techniques used in
wireless sensor networks requires a deep understanding of both networking principles and
cryptographic concepts.
Furthermore, conducting empirical research in this area can be particularly challenging due to the
practical limitations of testing and evaluating security mechanisms in real-world scenarios. Simulating
realistic network environments and assessing the effectiveness of different security solutions often
requires specialized equipment and expertise.
Given the complexities involved, many students find themselves overwhelmed and in need of
assistance when writing their thesis on wireless sensor network security. That's where ⇒
HelpWriting.net ⇔ comes in. With a team of experienced academic writers specializing in computer
science and network security, ⇒ HelpWriting.net ⇔ offers professional thesis writing services
tailored to your specific needs.
By entrusting your thesis to ⇒ HelpWriting.net ⇔, you can save time and alleviate the stress of
navigating the complexities of wireless sensor network security research. Our experts will work
closely with you to develop a well-researched and meticulously crafted thesis that meets the highest
academic standards.
Don't let the challenges of writing a thesis on wireless sensor network security hold you back. Order
from ⇒ HelpWriting.net ⇔ today and take the first step towards achieving your academic goals.
Then, in Section 3 we provide the results of our study of a representative collection of papers from
WSN conferences. A second impor- tant characteristic is that wireless communication is in- herently
unreliable and unstable. While sending the report, the information in transit may be attacked to
provide wrong information to the base stations or sinks. 1 Interruption: Communication link in sensor
networks becomes lost or unavailable. Another option for increasing the reliability of broad- casts is
to send a unicast message to each neighbor sepa- rately (repeated send). Therefore nodes would be
changing cluster membership depending on. The rest of the paper is organised as follows: in Sec-
tion 2 we give an overview of the different perspectives on WSNs that influence the design of
algorithms and protocols from the two sub-communities. While the set of challenges in sensor
networks are diverse, this paper focus only on the challenges related to the security of Wireless
Sensor Network. A middleware should be able to provide an d maintain the qu ality of service ov er
a long period of time while in parallel to be able to adapt in changes based on the application and on
the perform- ance metrics of the network like these of energy con- sumption and data delivery delay.
Barbie - Brand Strategy Presentation Barbie - Brand Strategy Presentation Good Stuff Happens in
1:1 Meetings: Why you need them and how to do them well Good Stuff Happens in 1:1 Meetings:
Why you need them and how to do them well Introduction to C Programming Language
Introduction to C Programming Language The Pixar Way: 37 Quotes on Developing and
Maintaining a Creative Company (fr. In order to maximize the system lifetime and coverage,
LEACH is using a set of methods such as distributed cluster formation with randomized selection of
cluster heads and local processing. Security in sensor networks is, therefore, a particularly
challenging task. We are aware that an asynchronous algorithm is hard- er to analyze with respect to
both the number of mes- sages sent per algorithm run, as well as convergence and stability
properties. Wireless sensor networks compose a large area of current research due to advances to
enabling. Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula. In order to
achieve that, Mate’s virtual machine acts as an abstraction layer middleware approaches that have
been developed in re- cent years and classifies them according to their pro- gramming paradigm. One
of the main functionalities of the system is the collection and an alysis of network informa- tion
metrics such as nodes next hop and neighbors. This growth produced problems in maintaining and
managing those networks, thus the need of network management was realized. A brief discussion on
the future direction of research in WSN security is also included. Activity diagrams can also be used
to analyse the performance of the network. Early Tech Adoption: Foolish or Pragmatic? - 17th
ISACA South Florida WOW Con. This means that energy is a scarce resource and energy effi ciency
is key in designing protocols and algorithms. As the radio is and will remain the largest consumer of
energy in the node it is important to communicate only when necessary. Due to resource constraints
in the sensor nodes, traditional security mechanisms with large overhead of computation and
communication are infeasible in WSNs. Subject to our trials and the development of our middleware
this protocol will be introduced both hand written in the middleware engine as well as it will be
introduced as part of the run- ning application. In order to achieve that, Mate’s virtual machine acts
as an abstraction layer with content specific rou ting. By only using the links that meet some quality
criterion it is possible to remove much of the unreliabil- ity. In this paper we identify the most
important reasons why these algorithms are disregarde d by the systems sub-community, and provide
pointers to remedy the lack of connection. The nature of a sensor network lends itself to a service
oriented component based framework. This chapter provides a comprehensive discussion on the state
of the art in security technologies for WSNs. Confusion of Terms. ?. Berkeley Mote. Crossbow.
RFID. MAC Protocols. Localization. Tiny-OS. ZigBee. Smart Dust. RSSI. This means that proto-
cols and algorithms have to take into account that any communication step may fail, especially when
using broad- cast messages.
Privacy prevents adversaries from obtaining information that may have private content. The protocol
is build upon two foundational assumptions. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield. Then the onboard sensors start
to collect interesting information. Usually, nodes with multi-hop capability are of higher power and,
if possible, often connect to the power line. Laboratory compaction study of fly ash mixed with lime
precipitated electropl. The focus on energy efficiency is not always found in algorithm papers. BOSS
architecture is overcoming this problem by act- ing as a mediator between UpnP networks and sensor
nodes. Confidentiality can also be required to prevent an adversary from undertaking traffic analysis.
While the architecture presented certainly presents a solid and basic design for a sensor. Then it
deals with some of the major security issues over wireless sensor networks (WSNs). Based on these
attributes, Agilla allows network re- programming thereby eliminating the power consum n cost of
flooding the network. However, physical proximity is far from the only fac- tor that determines
whether the bits will actually reach the intended recipients. An analysis of the data will take place in
later stages. ? Fault Detection Monitoring: The system dedicates its resources to identifying faults
and errors during the lifetime of the network. The use of mobile code can fa- cilitate an energy
efficient framework for the injection and the transmission of the application modules inside the
network. Conclusion Activity diagrams are a powerful tool for designing and monitoring wireless
sensor networks. Such attacks can easily be avoided by verify bi-directionality of a link before
taking action based on the information received over that link. (c) Node Capture: It is observed and
analyzed that even a single node capture is sufficient for an attacker to take over the entire network.
Once the sensor nodes are deployed, they are responsible for the self-organization of suitable
network infrastructure, often with multi-hop communication. In this paper we identify the most
important reasons why these algorithms are disregarde d by the systems sub-community, and provide
pointers to remedy the lack of connection. The centralized one identifies the role of the base station
as the most important one in the whole architecture. Energy policy also is contingent on the
application. However, link instability caused by quickly changing channel conditions such as
collisions, interference from other devices and moving obstacles can not be elimi- nated this way. A
typical defence against collisions is the use of error-correcting codes. (c) Unfairness: Repeated
application of these exhaustion or collision based MAC layer attacks or an abusive use of
cooperative MAC layer priority mechanisms, can lead into unfairness. A good-shared key discovery
approach should not permit an attacker to know shared keys between every two nodes. 10. Most key
management schemes discussed in literature so far are suitable for static WSNs. In some
applications, it may be acceptable to shut down a subset of nodes to save power, while other
applications require all nodes to be running simultaneously. We identify the most important reasons
why algo- rithms created from a theory perspective are disregarded by the systems community. The
functionalities of wireless sensor networks in different categories. Figure 2. The BOSS architecture,
song et al 2005. This does mean that every protocol and algorithm needs to be designed to cope with
unreliable communication. 3. Problem Analysis To assess the impact of the two different perspectives
on WSNs, we analyzed papers from major theory sub-com- munity conferences and from important
systems confer- ences for comparison. Power Consumption Structure of a Wireless Sensor Network
1. This can be done by including the round number in each message.
An important charac- teristic is that WSN nodes are running of batteries or ambient energy sources.
Authentication is the key solution to such attacks. Such a path key establishment needs to be
improved 9. A New Programming Model to Simulate Wireless Sensor Networks: Finding The Be.
Using a timer will not help either because it is impossible to bound the time required to finish the
communication for a single round. Middleware refers “to the software layer between operating
system and sensor application on. Header or full packet authentication can defeat such an attack. 5
Application Layer (a) Overwhelm attack: An attacker might attempt to overwhelm network nodes
with sensor stimuli, causing the network to forward large volumes of traffic to a base station. A
countermeasure against spoofing and alteration is to append a message authentication code (MAC)
after the message. Based On Protocol Stack,provides the layer wise issues. 1 Physical Layer (a)
Jamming: This is one of the Denial of Service Attacks in which the adversary attempts to disrupt the
operation of the network by broadcasting a high-energy signal. The latter can be connected to the
network user (via Internet, satellite or other system). Su t he 21st century techy is explained toge
limitation barat are incorporatd to be addresse the ss ofetwork appl ble numcations in modern so ties.
In this paper we identify the most important reasons why these algorithms are disregarde d by the
systems sub-community, and provide pointers to remedy the lack of connection. In an SQL query
format of SELECT-FROM-WHERE- GROUP-INCLUD ccess this object relational database which
mirrors the act odel. These costs need to be taken into account when assuming the pres- ence of a
topology control algorithm. These devices have greater transmission range, processing power, and
energy reserves than the network nodes. However, this Virtual Machine splits down into two
additional layers. Communications and Networking, 2003. WCNC 2003. 2003 IEEE, Volume: 3, 16-
20 March. To do this it is essential to minimize en ergy use b y reducing the amount of
communication between nodes without sacri- ficing useful data transmission. Lastly, al- gorithms are
sometimes organised in rounds which ham- pers implementation on real hardware. Unlike traditional
networks, sensor networks and their applications are real-time phenomena with dy- namic resources.
At the lowest layer the only primitive that is available is a local broadcast to a node's “neighbors”.
From this analysis we compiled a list of issues that complicate the implementation of the presented
algorithms in the real world. The first one ac- knowledges that the base station is at a fixed poin t and
in a far distance from the network nodes and the second one assumes that all nodes in the network
are homogeneous and energy constrained. However, due to distributed nature and their deployment
in remote areas, these networks are vulnerable to numerous security threats that can adversely affect
their performance. The developers having identi- fied the predominant limitations of wireless sensor
net- works such as energy consumption and limited band- width propose a new programming
paradigm that is based on a tiny centric virtual machine that will allow complex programs to be very
short. Additionally, some tools support simulation capabilities, allowing engineers to quickly test and
debug their designs before implementation. Additional power savings come from an operation
system (OS) for the nodes which supports. Unlocking the Power of ChatGPT and AI in Testing - A
Real-World Look, present. The SenOS architecture is based on a finite state machine which consists
of three compo- nents. In the following paragraphs we are going to present those design principles
for a substantial middleware development.
To overcome this, Multi path routing can be used in combination with random selection of paths to
destination, or braided paths can be used which represent paths which have no common link or
which do not have two consecutive common nodes, or use implicit acknowledgments, which ensure
that packets are forwarded as they were sent. (e) Sybil Attack: In this attack, a single node presents
multiple identities to all other nodes in the WSN. In order to develop a system architecture with the
above characteristics, we focus explicitly on the functions and the roles of wireless network
management systems. Additionally, we present th e middleware concept as a novel solution to the
limitations that wireless sensor net- works inhabit. If at any point the rate of generate data in- creases
beyond a level that exists in a predetermined threshold inside the system then the virtual sinks will
redirect the traffic to other visible nodes. In some applications, it may be acceptable to shut down a
subset of nodes to save power, while other applications require all nodes to be running
simultaneously. Almost all of the papers that assume reliable commu- nication use broadcast
messages in the algorithm. Passive Monitoring: The system role is to collect data during the lifetime
of the network. Figure 5 presents the Agilla model identifying the communication principle between
two neighbor net des. When packets collide, a change will likely occur in the data portion, causing a
checksum mismatch at the receiving end. Our survey presents the funda- mentals of wireless sensor
network, thus providing the necessary background required for understanding the organization,
functionality and limitations of those networks. Furthermore, activity diagrams can be used to test
the robustness of the WSN against external threats and disruptions. Usually, nodes with multi-hop
capability are of higher power and, if possible, often connect to the power line. Energy consumption
profiles for different MAC protocols, expressed as the ratio between the energy spent for sending
one unicast message and the energy spent for one broadcast message. Furthermore, they can also be
used to identify sources of interference and to determine optimal transmission routes. We hire top-
rated PhD and Master’s writers only to provide students with professional research proposal help at
affordable rates. The developers having identi-wireless sens fied the predominant limitations of
wireless sensor net- works such as energy consumption and limited band- width propose a new
programming paradigm that is based on a tiny centric virtual machine that will allow complex
programs to be very short. Confidentiality protects overall content or a field in a message. The nodes
close to the base station are mainly targeted. These MAC level retransmission schemes make it even
harder to compare the cost of unicast messages with the cost of broadcast messages. The protocols
implemented in the sensor networks must be scalable at these levels and maintain adequate
performance. Using a different MAC protocol can easily in- crease or reduce the energy
consumption with a signifi- cant factor. We can mitigate this attack by carefully tuning sensors so that
only the specifically desired stimulus, such as vehicular movement, as opposed to any movement,
triggers them. To browse Academia.edu and the wider internet faster and more securely, please take
a few seconds to upgrade your browser. Primary usage: Wireless Personal Area Networking (WPAN)
Wireless Local Area Networking (WLAN). Instability of the neighbor set may be caused by
communication unreli- ability, node failure and node mobility. 6.3. Reactive Organization
Recommendation 4: Design algorithms that react to other nodes’ messages, rather than using the
concept of rounds. The downside of such a network is that the base station must be within the radio
transmission range of all individual nodes and is not as robust as other networks due to its
dependence on a single node to manage the network. However, due to the scalability and complexity
of wire- less sensor networks it is proven quite difficult to man- age and quite expensive in terms of
memory cost. This attack consumes network bandwidth and drains node energy. Further, security
being vital to the acceptance and use of sensor networks for many applications; we have made an in
depth threat analysis of Wireless Sensor Network. Additionally, the amount of energy available to
each sensor cannot support long range. Fault Tolerance 2. Scalability 3. Production Costs 4.
Hardware Restrictions 5.
Such a path key establishment needs to be improved 9. For example, an activity diagram can be used
to represent the data flow in a WSN, including traffic intensity, packet size, and number of hops.
However, the key distribution schemes based on symmetric key cryptography are not perfect. The
single most common cause is that the algorithm is designed based on the com- munication-round
paradigm. A modified clustered based routing protocol to secure wireless sensor network.
Subsequently, the nodes must be capable of organizing. Following technique advance, key
management and security mechanisms for mobile WSNs should be considered and become a focus
of attention. 11. Though many key management approaches consider defending against node
compromise, the efficiency and security performance is not high when their mechanisms are
deployed in some special application environment. Usually, and as we have already men- tioned, they
can be deployed in hundreds and typically physical harsh in the deployment a physical contact for
replacement or maintenance is highly unlikely. The developers having identi- fied the predominant
limitations of wireless sensor net- works such as energy consumption and limited band- width
propose a new programming paradigm that is based on a tiny centric virtual machine that will allow
complex programs to be very short. There are various topics in Wireless Sensor Network (WSN) for
thesis and research. No prior knowledge of the topology of the network is necessary. This
architecture enables Mate to begin execution in response to a specific event such as a packet
transmission or a time out. This operation can also facilitate DOS attacks, by flooding the network. 5
Replaying existing messages: This operation threatens message freshness. Then, in Section 3 we
provide the results of our study of a representative collection of papers from WSN conferences.
GAF recognizes three transition states for the nodes, Figure 3, active, sleeping and discovery. The
communication protocol can be designed based on modular programming. This high level
architecture will enable the pro- gramming code to break up into small capsules of 24 instructions
each that can self-replicate inside the net- work. A countermeasure against spoofing and alteration is
to append a message authentication code (MAC) after the message. However, there may be
situations (e.g., in the battlefield) where the security of a base station needs to be considered. 7. All
key management protocols discussed in literature so far are based on symmetric key cryptography. A
mber of wireless sensor netwoems a tion of their archite helping us drthus proposed system. Their
core architecture is based on creating a communi- cation model that will facilitate message exchanges
be- tween nodes and the sink nodes of the wireless sensor network. Although we realize it is
sometimes more feasible to analyze algorithms in an abstracted environment, this does mean that the
results are not directly applicable to real-life sensor-networks. Sensor nodes in a network tend to be
specific, and therefore contain only the hardware needed. The centralized one identifies the role of
the base station as the most important one in the whole architecture. The middleware is comprised of
four different components which are called as needed, with. This is the price to be paid for creat- ing
an implementable algorithm. 7. Conclusions In this paper we have identified three common causes
for the lack of interest from the WSN systems sub-comm- unity for the algorithms developed by the
theory sub- community. Handling jamming over the MAC layer requires Admission Control
Mechanisms. Network layer deals with it, by mapping the jammed area in the network and routing
around the area. An attacker can exhaust a node’s resources by repeatedly sending RTS messages to
elicit CTS responses from a targeted neighbor node. Ultrasonic Sensor continued. 8. 9. 10. 11. 12. 3.4
FULL SENSOR NODE SCHEMATIC To next slide 13. However, most compromise activities
cannot be detected immediately.
Agilla is based on the Mate architecture in terms of the virtual machine specifications but unlike
Mate, which as we described above divides an applica- tion into capsules flooding the network,
Agilla uses mo- bile agents in order to deploy an application. We hire top-rated PhD and Master’s
writers only to provide students with professional research proposal help at affordable rates. The
protocols implemented in a sensor network must detect these faults as early as possible and be robust
enough to handle a comparatively large number of faults while maintaining the overall functionality
of the network. Second, all nodes that have received a message need to acknowledge the reception.
Characteristics of Activity Diagrams in WSNs Activity diagrams in WSNs possess certain
characteristics which make them both valuable and useful. When a round should be started, a single
node can simply decide that a new run of the algorithm is required and send the first message. It is
obvious, that after ing to hus to nergy ef ficient manner which of the prevention together with a
flexible way of re n efficiently and as long as possible. Third, if not all nodes have re- ceived the
broadcast, some form of retransmission scheme has to be employed, which is not trivial and will also
cost even more energy. How- ever, increasing the reliability of broadcast communica- tions is a very
difficult problem. EditorJST A Security Overview of Wireless Sensor Network A Security Overview
of Wireless Sensor Network IJCSIS Research Publications Mobile slide Mobile slide Aman singh
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR
NETWORKS AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS
SENSOR NETWORKS csandit A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY
WITH THE INTEGRATION OF CLUSTER. Thus, the study of node compromise distribution and
integrating it in key management is a promising research area. 1. Most current proposals are suitable
for static WSNs. Using “dummy packets” throughout the network to equalize traffic volume and
thus prevent traffic analysis. RachelPearson36 Unlocking the Power of ChatGPT and AI in Testing -
A Real-World Look, present. The most important differences stem from the distinction between
broadcast and unicast messages. Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South
Florida WOW Con. The application of private key operations to sensor nodes needs to be studied
further. 2. Symmetric key cryptography is superior to public key cryptography in terms of speed and
low energy cost. This the topology implement by the new mesh network standard known as ZigBee.
PRESENTATION FLOW WIRELESS SENSOR NETWORK BRIEF THEORY DEVELOPMENT
PLAN HARDWARE IMPLEMENTATION PROGRAMMING AND SOFTWARE PROBLEMS
TESTING AND RESULTS FUTURE WORK QUESTION AND ANSWERS 3. 4. 5. 6. 3.
HARDWARE IMPLEMENTATION 3.1 ULTRASONIC SENSOR FOR NODE a). A
countermeasure to Sybil Attack is by using a unique shared symmetric key for each node with the
base station.(f) Wormhole Attacks: An adversary can tunnel messages received in one part of the
network over a low latency link and replay them in another part of the network. Although for many
of the algorithms this sim- ply means that a node will only be able to participate in the next run (not
round) of the algorithm. The second block presents the distributed network query processor that
consists of a number of abstract data types with virtual relation- ships with the operating system of
the network. Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present.
This causes a large number of nodes sending packets to this imaginary neighbor and thus into
oblivion. Although in synchronous round-based algorithms this is necessarily a problem, this need
not be a problem in asynchronous algorithms because further iterations of an algorithm should
compensate for the missing values. The system is then able to maintain better available network
performance by predicting future events based on past o nes. Once the sensor nodes are deployed,
they are responsible for the self-organization of suitable network infrastructure, often with multi-hop
communication. Many research papers from the theory sub- community assume, either explicitly or
implicitly, that reliable communication is provided by the communica- tion subsystem. Conversely,
while middleware interfaces may be generic, the interfaces of application. A second technique is to
use time-division multiplexing where each node is allotted a time slot in which it can transmit. (b)
Collision: This is very much similar to the continuous channel attack. Design Issues and Challenges
in Wireless Sensor Networks Design Issues and Challenges in Wireless Sensor Networks Mobile
Wireless Network Essay Mobile Wireless Network Essay International Journal of Computational
Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
A modified clustered based routing protocol to secure wireless sensor network.
Sensor TX schematic 7. e). Ultrasonic receiver amplifier. f). Ultrasonic receiver detection. g).
Ultrasonic receiver output comparator. Unlocking the Power of ChatGPT and AI in Testing - A Real-
World Look, present. Authentication is the key solution to such attacks. The developers having
identi-wireless sens fied the predominant limitations of wireless sensor net- works such as energy
consumption and limited band- width propose a new programming paradigm that is based on a tiny
centric virtual machine that will allow complex programs to be very short. There are various topics in
Wireless Sensor Network (WSN) for thesis and research. MANNA provides a general architecture
for managing a wireless sensor network by using a multidimensional plane for the functional,
physical and the informational architecture of the network. The design method closely follows
standard software. Although we realize it is sometimes more feasible to analyze algorithms in an
abstracted environment, this does mean that the results are not directly applicable to real-life sensor-
networks. The introductory section gives brief information on the WSN components and its
architecture. Furthermore, there are several software tools available which allow users to create and
work with activity diagrams easily and efficiently. Applications split into sensor, node, and network
applications, providing the basis for. WSNs could be used in industrial settings for machine. Levis
and D. Culler (2002). quests. Each of the three co ntexts has an operant stack and a return address
one. The more complicated network topology incurs higher overhead costs for forming and. The
client application requests data from the network about surface conditions in a certain. It shows the
interactions between nodes, devices, and components of the network, as well as the behavior of the
system itself. To exploit the useful life of the network, protocols must design from the beginning to
manage energy resources efficiently. Security services include the following: Authentication ensures
that the other end of a connection or the originator of a packet is the node that is claimed. Benef its
to this architecture can be found in areas of proc essing power and decision making. Passive
Monitoring: The system role is to collect data during the lifetime of the network. Using a multi-hop
routing algorithm Mires will route those advertisement messages to the sink node. A possible
solution to this type of attack is to require authentication of all packets including control fields
communicated between hosts. If at any point the rate of generate data in- creases beyond a level that
exists in a predetermined threshold inside the system then the virtual sinks will redirect the traffic to
other visible nodes. Recommendation 3: Specify an algorithm's energy efficiency by analyzing the
number of messages sent, differentiating between unicast and broadcast messages. IJCNCJournal
Design Issues and Challenges in Wireless Sensor Networks Design Issues and Challenges in Wireless
Sensor Networks KhushbooGupta145 Mobile Wireless Network Essay Mobile Wireless Network
Essay Susan Myers International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline A modified
clustered based routing protocol to secure wireless sensor network. This time though, the system will
be eligible to identify and detect any even ts and act upon them in real time mainly by altering the
parameters of the fixed asset under its control. ? Proactive Monitoring: The system collects and
analyzes all the incoming data concerned with the state of the network. These data objects will
remain in the node regardless of the agen t status. Host Based Vs Network Based 1 Host-based
attacks It is further broken down in to: User compromise: This involves compromising the users of a
WSN, e.g. by cheating the users into revealing information such as passwords or keys about the
sensor nodes. Furthermore, if a node has many neighbors it will take a long time to reach all of them.
4.2. Handling Unreliability Recommendation 1: Design algorithms such that unreliable
communication is not disruptive. Wireless Network. Wireless networks are telephone or computer
networks that use radio as their carrier or physical layer.