A Revised Approach on Attack Identification and Handling in WSN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Security is one of the most critical vectors for any network. When the network is an open adhoc network; this criticality also increases. Sensor network is one of such network that suffers from different kind of internal and external attacks. The internal attacks are more crucial for the network because it is done by the authenticated member nodes. These attacks affect the network by affecting the QoS parameters over the network. In this present; a layered architecture is presented to handle the internal attack in wireless sensor network and to provide the effective throughput over the network. The presented work is divided in three stages. In first stage; the network nodes are analyzed under the throughput; delay and energy consumption parameters. Based on this analysis; the first level critical nodes are identified. Now before deciding the nodes as the attacker nodes; these nodes are required to keep in observation. At the second stage; to observe the nodes; the effective monitoring node selection is defined in this work. To monitor each attacker nodes m observer nodes are identified under the coverage range and energy parameters. The analysis on these nodes is performed under different parameters such as PDR; energy loss; communication delay etc. Now at the third stage; the Dempster-Shafer theory will be applied on these parameteric evidence under different beliefs. Based on these belief oriented observation; the identification of the attacker node will be done..

Keywords: WSN Characteristic parameters, Dampster Shafer Theory, Attacker, Energy consumption

Edition: Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

Share this Article

How to Cite this Article?

Seema Khokher, "A Revised Approach on Attack Identification and Handling in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014652, Volume 3 Issue 6, June 2014, 2171 - 2174

102 PDF Views | 83 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attacker'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Similar Articles with Keyword 'Energy consumption'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1450 - 1456

An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks

M. Devapriya, R. Sudha

Share this Article
Top