ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Modified Algorithm and Protocol for Replica Attack Prevention for Wireless Sensor Network

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 4)

Publication Date:

Authors : ; ;

Page : 185-189

Keywords : WSN; Replication attack; AODV Routing Protocols; NS-235;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless networks are achievement recognition to its height nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It's an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. So as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Replication attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Replication attack for each protocols is taken under consideration. The impact of Node Replication attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).

Last modified: 2021-06-30 18:32:29