ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Recognition of Packet Dropping and Modification in WSN’s using Ranking Algorithms

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 936-941

Keywords : packet droppers and modifiers; intrusion detection; Routing; wireless sensor networks; Authentication Code; Compromised nodes;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In wireless sensor networks the Packet Droppers and Modifiers are common attacks. It is very difficult to identify such attacks and this attack interrupts the communication in wireless multi hop sensor networks. In this we can identify the Packet Droppers and Packet Modifiers using ranking algorithms and packet marks. The Performance is represented using detection rate and false positive probability. So Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in Wireless multi hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. In this paper extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of the scheme. The Proposed scheme provides an effective mechanism for catching compromised node.

Last modified: 2014-08-05 02:29:36