SlideShare a Scribd company logo
1 of 14
Based on a research paper by
  DI MA, UNIVERSITY OF MICHIGAN-DEARBORN
GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE




                                 PRESENTED BY :
                                 IMRAN AHMED KHAN
                                 University of Texas
Wireless communication is playing an
increasingly important role in many
spheres of society. It has become an
essential means of communication. Recent
advances in technology have motivated
new application domains for wireless
networks. The purpose of this article is to
examine security and privacy issues in
some new and emerging types of wireless
networks, and attempt           to identify
directions for future research.
In this article we consider security and privacy
  issues in certain emerging wireless networks:

   Wireless sensor networks (WSN)
   Vehicular ad hoc networks (VANET)
Wireless networks are inherently more
    vulnerable than their wired counterparts.
    Notable factors contributing to security
    problems include the following:
   Channel - Wireless usually involve broadcast
    communication, which makes eavesdropping
    and jamming easier.
   Mobility - If a wireless device is affiliated with
    a person, tracking the device reveals that
    person's location. Thus privacy become a
    important concern.
   Resources – End host usually battery powered
    devices which limits computation, size of RAM
    and secondary storage. which open the door of
    denial of service attacks at battery depletion
   Accessibility- Some devices are generally left
    unattended and are places in remote locations.
    which increases more chances for physical
    attacks.
   The original motivation for WSN research
    stemmed from the vision of Smart Dust in the
    late 1990s
   It consists of large number of small cheap
    resource constraint sensors and a sink or base
    stations
   Easy to deploy
   Use in military , environmental, disaster relief
    and homeland security
   Constant presence of a sink
   Limited life span

To resolve above issues, two new WSN
  introduced:

   Unattended WSN ( UWSN )
   Radio frequency identification ( RFID )
Unattended WSNs operate without continuous
presence of (or supervision by) a sink. Instead,
sensor-collected data is harvested by an itinerant
sink that visits the network intermittently, with a
certain upper bound on the interval between
successive visits. Because sensors cannot
Communicate with the sink at will, they must
   accumulate data in situ and wait for the sink. The
unattended nature of the network might be promoted
by some design requirements to avoid any
central point of failure.
   Data Protection at individual sensor - The main
    challenge is to protect the data on individual
    sensor from the attacker. To attained this
    encryption is used. So that even if the attacker get
    control on the sensor, it cannot decrypt the data.
    this is attained by periodically updating secret
    keys through One way function ( hash functions )

   Data Survival - To acheive data survival sensor
    plays a hide & seek game by moving all of its data
    around the network. This is ultimately a losing
    game unless encryption is used.
   Secrecy - The attackers aims to learns sensors
    secrets in order to decrypt its data later. One of the
    proposed solution allow sensor to recover from the
    compromise by simultaneously providing and
    obtaining help to/from peer sensors.
   Authentication - Data obtain by each sensor is
    authenticated by the sink. So that it can identify
    that data is modified by any attacker or not. One of
    the proposed technique involves sensors to co-sign
    the data of their neighboring nodes. So that if any
    one of the co-signer is not compromised, sink can
    verify integrity and authenticity.
   Sensors are based on the batteries. If battery
    runs out , sensor will die.
   Rsensors and Rsink.
   Rsensors are also equipped with energy
    harvesting means:
     solar
     thermal
     vibrational

   Reduced size.
   Presence of Rsink is necessary.
   Cryptographic operations.
   RFID Reader Collision
   Since RFID systems make use of the
    electromagnetic spectrum They are relatively
    easy to jam using energy at the right frequency.
In this article we examine security and privacy issues in
some new and emerging wireless networks. In surveying
relevant literature, we tried to identify new security and
privacy challenges as well as inadequacies of current
approaches. Certain challenges arise from the unattended,
intermittently connected, and possibly mobile network
operation. Consequently, we need to anticipate threats
arising from malicious exploitation of such network
features and design appropriate security countermeasures.
Also, since some emerging wireless networks are ad hoc in
nature, infrastructure-independent security and privacy
techniques are particularly suitable. Finally, emerging
wireless devices such as RSensors motivate the
development of new cryptographic primitives and
protocols.

More Related Content

What's hot

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
AneeshGKumar
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

What's hot (20)

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
IoT security
IoT securityIoT security
IoT security
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoringWireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoring
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Node localization
Node localizationNode localization
Node localization
 

Viewers also liked

Chirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russiaChirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russia
hindujudaic
 
[bone shaker] :: DIY health final
[bone shaker] :: DIY health final[bone shaker] :: DIY health final
[bone shaker] :: DIY health final
kimispencer
 

Viewers also liked (17)

Innovation Presentation
Innovation PresentationInnovation Presentation
Innovation Presentation
 
Безпілотники
БезпілотникиБезпілотники
Безпілотники
 
Chirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russiaChirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russia
 
[bone shaker] :: DIY health final
[bone shaker] :: DIY health final[bone shaker] :: DIY health final
[bone shaker] :: DIY health final
 
Security in sensor network1
Security in sensor network1Security in sensor network1
Security in sensor network1
 
AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)
 
Security issues
Security issuesSecurity issues
Security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Drones
DronesDrones
Drones
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 
The Future Of Battlefield Ma Vs
The Future Of Battlefield Ma VsThe Future Of Battlefield Ma Vs
The Future Of Battlefield Ma Vs
 
UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of Applications
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 

Similar to Security and privacy in Wireless Sensor Networks

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
elango30
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 

Similar to Security and privacy in Wireless Sensor Networks (20)

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
G017644454
G017644454G017644454
G017644454
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Wsn
WsnWsn
Wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Security and privacy in Wireless Sensor Networks

  • 1. Based on a research paper by DI MA, UNIVERSITY OF MICHIGAN-DEARBORN GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE PRESENTED BY : IMRAN AHMED KHAN University of Texas
  • 2. Wireless communication is playing an increasingly important role in many spheres of society. It has become an essential means of communication. Recent advances in technology have motivated new application domains for wireless networks. The purpose of this article is to examine security and privacy issues in some new and emerging types of wireless networks, and attempt to identify directions for future research.
  • 3. In this article we consider security and privacy issues in certain emerging wireless networks:  Wireless sensor networks (WSN)  Vehicular ad hoc networks (VANET)
  • 4. Wireless networks are inherently more vulnerable than their wired counterparts. Notable factors contributing to security problems include the following:  Channel - Wireless usually involve broadcast communication, which makes eavesdropping and jamming easier.  Mobility - If a wireless device is affiliated with a person, tracking the device reveals that person's location. Thus privacy become a important concern.
  • 5. Resources – End host usually battery powered devices which limits computation, size of RAM and secondary storage. which open the door of denial of service attacks at battery depletion  Accessibility- Some devices are generally left unattended and are places in remote locations. which increases more chances for physical attacks.
  • 6. The original motivation for WSN research stemmed from the vision of Smart Dust in the late 1990s  It consists of large number of small cheap resource constraint sensors and a sink or base stations  Easy to deploy  Use in military , environmental, disaster relief and homeland security
  • 7.
  • 8. Constant presence of a sink  Limited life span To resolve above issues, two new WSN introduced:  Unattended WSN ( UWSN )  Radio frequency identification ( RFID )
  • 9. Unattended WSNs operate without continuous presence of (or supervision by) a sink. Instead, sensor-collected data is harvested by an itinerant sink that visits the network intermittently, with a certain upper bound on the interval between successive visits. Because sensors cannot Communicate with the sink at will, they must accumulate data in situ and wait for the sink. The unattended nature of the network might be promoted by some design requirements to avoid any central point of failure.
  • 10. Data Protection at individual sensor - The main challenge is to protect the data on individual sensor from the attacker. To attained this encryption is used. So that even if the attacker get control on the sensor, it cannot decrypt the data. this is attained by periodically updating secret keys through One way function ( hash functions )  Data Survival - To acheive data survival sensor plays a hide & seek game by moving all of its data around the network. This is ultimately a losing game unless encryption is used.
  • 11. Secrecy - The attackers aims to learns sensors secrets in order to decrypt its data later. One of the proposed solution allow sensor to recover from the compromise by simultaneously providing and obtaining help to/from peer sensors.  Authentication - Data obtain by each sensor is authenticated by the sink. So that it can identify that data is modified by any attacker or not. One of the proposed technique involves sensors to co-sign the data of their neighboring nodes. So that if any one of the co-signer is not compromised, sink can verify integrity and authenticity.
  • 12. Sensors are based on the batteries. If battery runs out , sensor will die.  Rsensors and Rsink.  Rsensors are also equipped with energy harvesting means:  solar  thermal  vibrational  Reduced size.
  • 13. Presence of Rsink is necessary.  Cryptographic operations.  RFID Reader Collision  Since RFID systems make use of the electromagnetic spectrum They are relatively easy to jam using energy at the right frequency.
  • 14. In this article we examine security and privacy issues in some new and emerging wireless networks. In surveying relevant literature, we tried to identify new security and privacy challenges as well as inadequacies of current approaches. Certain challenges arise from the unattended, intermittently connected, and possibly mobile network operation. Consequently, we need to anticipate threats arising from malicious exploitation of such network features and design appropriate security countermeasures. Also, since some emerging wireless networks are ad hoc in nature, infrastructure-independent security and privacy techniques are particularly suitable. Finally, emerging wireless devices such as RSensors motivate the development of new cryptographic primitives and protocols.