ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Efficient Clustering Routing from Different Attacks in WSN: A Survey

Journal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 171-177

Keywords : WSN Clustering; Attacker; Energy; Routing; Security;

Source : Downloadexternal Find it from : Google Scholarexternal


The Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are deployed. Since large number of sensor nodes is densely deployed, neighbour nodes may be very close to each other. Hence, multi-hop communication in sensor networks is efficiently expected. Security is an important feature for the deployment of Wireless Sensor Networks. In sensor network the attacker called flooding attack that disturb the whole activity of network and also consume link capacity and processing capability of each node in WSN. In this survey the previous protection scheme has showing the better performance that is providing by simulation results. The protection scheme has recovers the network performance in presence of attacker and provides attack free environment. The attacker information is identified by different scheme through applied security scheme and secure network from flooding attacker. The WSN overview, applications, routing techniques, types of attacks and security requirement are also mentioned in different sections. The base station is only collecting the information sending to BS. The BS is not much intelligent to take action against malicious information. The CH is identified the sink in network and after finding the sink the information of sink is send back to sender. The sink is almost exist is in next Cluster head area and sender utilizes energy by selecting the node having enough residual energy for communication. The attacker aim is to consume the resources at most of the time because of that the routing performance is affected.

Last modified: 2018-09-22 23:22:39