International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105 | Views: 247

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.9 / 10


     

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre


Abstract: Wireless Sensor Networks are used worldwide across the Globe for communication in networks. Such Wireless Sensor Networks are easily vulnerable for range of attacks. The range of Adversaries attacks can also be easily launched in the wireless network. The paper presents the newly generated models GMFAD and CDAL-M which makes use of the physical property mainly Received Signal Strength associated with each node of network. It mainly focuses on received signal strength means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on detecting Identity based Adversaries attack and number of attackers in the cluster network also localizing the actual position of attackers. Also this paper can be used for Detecting Denial of Service attacks and localizing their position. The experimental results show that this advanced model doesnt require any additional efforts and also extra modifications to the existing. Hence topic depict that this models gives the advanced security management as compared to the existing cryptographic security techniques.


Keywords: GMFAD, CDAL-M, RSS, DoS, WSN


Edition: Volume 4 Issue 6, June 2015


Pages: 2386 - 2390




Text copied to Clipboard!
Santosh S. Doifode, D. C. Mehetre, "GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2386-2390, https://www.ijsr.net/getabstract.php?paperid=SUB155930

Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article
Top