SURVEY OF IDENTIFICATION TECHNIQUES OF ADVERSARY ATTACKS IN WIRELESS SENSOR NETWORK
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.6, No. 7)Publication Date: 2015-07-30
Authors : SANTOSH S. DOIFODE; D. C. MEHETRE;
Page : 1-9
Keywords : GMFAD; CDAL-M; RSS; DoS and WSN; Iaeme Publication; IAEME; Technology; Engineering; IJCET;
Abstract
Adversary Attackers take the identity of another node in the wireless sensor network and establish a connection that will allow gaining access to the other hosts and their important and personnel data. It will reduce the performance of the network and disrupt many security issues. With the open medium, distributed cooperation and constrained capabilities, the wireless sensor nodes are more unprotected to such type of attacks compared with wired networks. The conventional security approaches such as cryptographic mechanisms are not always desirable because it requires key management and additional infrastructural overheads. The detection and localization of multiple attacks makes complex when the multiple number of attackers attacks the wireless sensor network. This paper describes to use spatial information received signal strength, a natural property associated with each node identity, difficult to falsify, and not relevant process on cryptography, as the basis for 1) Detection of adversary attacks 2) Determining the number of attackers when multiple adversaries masquerading as the same node identity 3) Localizing multiple adversary attackers and 4) Detection of Denial of service attack.
Other Latest Articles
- SURVEY ON DATABASE DESIGN FOR SAAS CLOUD APPLICATION
- IMAGE AND ANNOTATION RETRIEVAL VIA IMAGE CONTENTS AND TAGS
- EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS
- SECURITY OF HEALTHCARE DATA AT REST IN CLOUD WITH MOBILE HEALTH MONITORING SYSTEM
- EFFICIENT MINING OF FAST FREQUENT ITEM SET DISCOVERY FROM STOCK MARKET DATA
Last modified: 2016-05-27 21:29:16