ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)

Publication Date:

Authors : ; ; ;

Page : 904-911

Keywords : Wireless sensor networks; QoF; Fault tolerance; Distributed algorithm; wormhole attack; compromised node detection;

Source : Downloadexternal Find it from : Google Scholarexternal


In Wireless Sensor Network, the multi-hop transmissions are used for data collection as well as to deliver a data packet by sequence of nodes. While transmitting the packets over a network, the faults occurring are common. In order to avoid faults and to ensure the network Quality of Service the WSN need to take actions for degradation of services. In existing system, the generic link model only considers the forwarding quality of a node using the metrics like packet delay, Packet Delivery Ratio, number of packets dropped but doesn’t focus on the fault detection. The proposed system implements Distributed Localized Fault Sensor technique which helps to diagnose the sensor node during fault detection in a deployed area of sensor network. The diagnosis will complete if all the sensor nodes are identified as good or faulty in a predefined time. Thus the Localized Faulty Sensor Detection overcomes the problem of identification of faulty nodes in a sensor network and has considerable accuracy rate. As a result, the proposed system has a high fault detection accuracy and low false alarm rate. Individual sensor nodes are subject to be compromised in a security because they may be deployed in hostile environments and each sensor node communicates in a wireless medium. An adversary can produce a wormhole by directly linking two compromised nodes or using out-of-band channels to violate the security of a network. The proposed method uses ACK messages for detecting wormholes and is based on a Lightweight Countermeasure for Wormhole Attacks (LITEWORP) scheme. As a result the proposed method reduces energy consumption as well as provides greater network security.

Last modified: 2014-04-26 17:02:13