Secure Efficient Clustering Routing from Different Attacks in WSN: A SurveyJournal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.3, No. 3)
Publication Date: 2018-08-28
Authors : Ajay Kumar Mishra Swatantra Tiwari;
Page : 171-177
Keywords : WSN Clustering; Attacker; Energy; Routing; Security;
The Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are deployed. Since large number of sensor nodes is densely deployed, neighbour nodes may be very close to each other. Hence, multi-hop communication in sensor networks is efficiently expected. Security is an important feature for the deployment of Wireless Sensor Networks. In sensor network the attacker called flooding attack that disturb the whole activity of network and also consume link capacity and processing capability of each node in WSN. In this survey the previous protection scheme has showing the better performance that is providing by simulation results. The protection scheme has recovers the network performance in presence of attacker and provides attack free environment. The attacker information is identified by different scheme through applied security scheme and secure network from flooding attacker. The WSN overview, applications, routing techniques, types of attacks and security requirement are also mentioned in different sections. The base station is only collecting the information sending to BS. The BS is not much intelligent to take action against malicious information. The CH is identified the sink in network and after finding the sink the information of sink is send back to sender. The sink is almost exist is in next Cluster head area and sender utilizes energy by selecting the node having enough residual energy for communication. The attacker aim is to consume the resources at most of the time because of that the routing performance is affected.
Other Latest Articles
Last modified: 2018-09-22 23:22:39