International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 262

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.2 / 10


     

AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN

Varpreet Kaur, Pratibha


Abstract: Wireless sensor network is a branch of networking that deals with sensing of information from deployed area. Sensor nodes collect the information by sensing the information and transmit using sink nodes. Sink nodes collects the information from sensor nodes and transmit this information to base station. In wireless sensor network various malicious nodes has been introduced to perform various types of attacks on the network to degrade or collect same information. The new attack that has been used for acquiring information by performing sinkhole attack. Sink hole attack is performed on sink node attacking node replaces the actual sink node by advertising its availability and resumes all the data from the sensor node. Actual data doesnt receive at base station that loss the information of the network.


Keywords: Wireless Sensor Network, AODV, DSDV, TORA, DSDV


Edition: Volume 5 Issue 5, May 2016


Pages: 969 - 973


DOI: https://www.doi.org/10.21275/NOV163524



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Varpreet Kaur, Pratibha, "AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 969-973, https://www.ijsr.net/getabstract.php?paperid=NOV163524, DOI: https://www.doi.org/10.21275/NOV163524



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top