Using a strong encryption and decryption technique one can obtain strong protection against eavesdropping. Proper authentication …show more content…
With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place.
The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions. Also, one can detect node compromise by comparing the previous position of nodes with their current positions, if node compromise must be done by physically capturing a node, reprogramming and then redeploying it in the