Downloads: 105
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode | D. C. Mehetre [3]
Abstract: Wireless Sensor Networks are used worldwide across the Globe for communication in networks. Such Wireless Sensor Networks are easily vulnerable for range of attacks. The range of Adversaries attacks can also be easily launched in the wireless network. The paper presents the newly generated models GMFAD and CDAL-M which makes use of the physical property mainly Received Signal Strength associated with each node of network. It mainly focuses on received signal strength means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on detecting Identity based Adversaries attack and number of attackers in the cluster network also localizing the actual position of attackers. Also this paper can be used for Detecting Denial of Service attacks and localizing their position. The experimental results show that this advanced model doesnt require any additional efforts and also extra modifications to the existing. Hence topic depict that this models gives the advanced security management as compared to the existing cryptographic security techniques.
Keywords: GMFAD, CDAL-M, RSS, DoS, WSN
Edition: Volume 4 Issue 6, June 2015,
Pages: 2386 - 2390
Similar Articles with Keyword 'RSS'
Downloads: 92
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Downloads: 106
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2319 - 2322Indoor Tracking Using Wi-Fi Routers on a Smartphone
Rutujit K. Diwate | D. N. Rewadkar [11]