International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 259

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.3 / 10


     

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher


Abstract: Security is one of the most critical vectors for any network. When the network is an open adhoc network; this criticality also increases. Sensor network is one of such network that suffers from different kind of internal and external attacks. The internal attacks are more crucial for the network because it is done by the authenticated member nodes. These attacks affect the network by affecting the QoS parameters over the network. In this present; a layered architecture is presented to handle the internal attack in wireless sensor network and to provide the effective throughput over the network. The presented work is divided in three stages. In first stage; the network nodes are analyzed under the throughput; delay and energy consumption parameters. Based on this analysis; the first level critical nodes are identified. Now before deciding the nodes as the attacker nodes; these nodes are required to keep in observation. At the second stage; to observe the nodes; the effective monitoring node selection is defined in this work. To monitor each attacker nodes m observer nodes are identified under the coverage range and energy parameters. The analysis on these nodes is performed under different parameters such as PDR; energy loss; communication delay etc. Now at the third stage; the Dempster-Shafer theory will be applied on these parameteric evidence under different beliefs. Based on these belief oriented observation; the identification of the attacker node will be done. .


Keywords: WSN Characteristic parameters, Dampster Shafer Theory, Attacker, Energy consumption


Edition: Volume 3 Issue 6, June 2014


Pages: 2171 - 2174



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Seema Khokher, "A Revised Approach on Attack Identification and Handling in WSN", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 2171-2174, https://www.ijsr.net/getabstract.php?paperid=2014652, DOI: https://www.doi.org/10.21275/2014652

Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 1, January 2024

Pages: 324 - 329

Optimizing Data Centers for Sustainability: The Role of Serverless Fog Computing in Artificial Intelligence

Jatin Pal Singh

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 7, July 2024

Pages: 807 - 817

Adaptive Caching Techniques for Optimizing Vehicle Performance

Venkata Naga Sai Kiran Challa

Share this Article



Top