ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protected Data Transfer in Wireless Sensor Network Using Promiscuous Mode?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 643-648

Keywords : Wireless Sensor Networks; Security Attacks; Wormhole Attacks; AODV; Promiscuous mode;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor Networks consist of large number of sensor nodes computing the sense, and communications capabilities. Wireless sensor networks are widely used in many applications like battlefield monitoring, environment monitoring and so forth. These applications have the cooperation among various sensor nodes which is needed to forward the data packets to the base station. In this paper we are explaining about Wormhole attacks. A wormhole attack is a severe attack in wsn. It is a severe threat to the network layer. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multiple path route. In this paper we are suggesting about promiscuous mode with the help of two extensions called Watchdog and Path rater in AODV protocol. This method is used detect and isolate the malicious node during wormhole attack and it observes the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects to isolate the malicious node from the network.

Last modified: 2014-11-29 15:53:55