Click for new scientific resources and news about Corona[COVID-19]

Paper Information

Journal:   JOURNAL OF ADVANCES IN COMPUTER ENGINEERING AND TECHNOLOGY   spring 2018 , Volume 4 , Number 2 (serial 14); Page(s) 87 To 100.

IMNTV-Identifying Malicious Nodes Using Trust Value in Wireless Sensor Networks

Author(s):  Swathi b.h.*, Megha v., Gururaj h.l., Hamsaveni m., Janhavi v.
* Vidyavardhaka College of Engineering
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value.
Keyword(s): WSNs,Packet modification,Packet Dropping,Packet fake routing,bad mouthing attack,Sybil attack
  • ندارد
مباني نظري و تجربي ونداليسم: مروري بر يافته هاي يك تحقيق Yearly Visit 29
Latest on Blog
Enter SID Blog