A Modified Algorithm and Protocol for Replica Attack Prevention for Wireless Sensor Network
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 4)Publication Date: 2017-04-05
Authors : Dharmendra Singh Chouhan; Pritesh Jain;
Page : 185-189
Keywords : WSN; Replication attack; AODV Routing Protocols; NS-235;
Abstract
Wireless networks are achievement recognition to its height nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It's an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. So as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Replication attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Replication attack for each protocols is taken under consideration. The impact of Node Replication attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).
Other Latest Articles
- Implementation Benefit to Business Intelligence using Data Mining Techniques
- Data Hiding using Edge-based Image Steganography
- Determination of Factors Affecting Treatment Compliance among Hypertension Patients in Baghdad Teaching Hospital
- Survey On: Auditing and Resisting Key Exposure on Cloud Storage
- A Review of Development of Safety Management Module for Simhastha 2016 at Ujjain
Last modified: 2021-06-30 18:32:29