International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105 | Views: 279

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.9 / 10


     

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre


Abstract: Wireless Sensor Networks are used worldwide across the Globe for communication in networks. Such Wireless Sensor Networks are easily vulnerable for range of attacks. The range of Adversaries attacks can also be easily launched in the wireless network. The paper presents the newly generated models GMFAD and CDAL-M which makes use of the physical property mainly Received Signal Strength associated with each node of network. It mainly focuses on received signal strength means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on detecting Identity based Adversaries attack and number of attackers in the cluster network also localizing the actual position of attackers. Also this paper can be used for Detecting Denial of Service attacks and localizing their position. The experimental results show that this advanced model doesnt require any additional efforts and also extra modifications to the existing. Hence topic depict that this models gives the advanced security management as compared to the existing cryptographic security techniques.


Keywords: GMFAD, CDAL-M, RSS, DoS, WSN


Edition: Volume 4 Issue 6, June 2015


Pages: 2386 - 2390



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Santosh S. Doifode, D. C. Mehetre, "GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2386-2390, https://www.ijsr.net/getabstract.php?paperid=SUB155930, DOI: https://www.doi.org/10.21275/SUB155930



Similar Articles

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 1755 - 1759

Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack

Jaspreet Kaur, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 75

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article



Top