International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 106

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Security is one of the most critical vectors for any network. When the network is an open adhoc network; this criticality also increases. Sensor network is one of such network that suffers from different kind of internal and external attacks. The internal attacks are more crucial for the network because it is done by the authenticated member nodes. These attacks affect the network by affecting the QoS parameters over the network. In this present; a layered architecture is presented to handle the internal attack in wireless sensor network and to provide the effective throughput over the network. The presented work is divided in three stages. In first stage; the network nodes are analyzed under the throughput; delay and energy consumption parameters. Based on this analysis; the first level critical nodes are identified. Now before deciding the nodes as the attacker nodes; these nodes are required to keep in observation. At the second stage; to observe the nodes; the effective monitoring node selection is defined in this work. To monitor each attacker nodes m observer nodes are identified under the coverage range and energy parameters. The analysis on these nodes is performed under different parameters such as PDR; energy loss; communication delay etc. Now at the third stage; the Dempster-Shafer theory will be applied on these parameteric evidence under different beliefs. Based on these belief oriented observation; the identification of the attacker node will be done. .

Keywords: WSN Characteristic parameters, Dampster Shafer Theory, Attacker, Energy consumption

Edition: Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

Share this Article

How to Cite this Article?

Seema Khokher, "A Revised Approach on Attack Identification and Handling in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014652, Volume 3 Issue 6, June 2014, 2171 - 2174

Enter Your Email Address


Similar Articles with Keyword 'Attacker'

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'Energy consumption'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Similar Articles with Keyword 'WSN'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Characteristic'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Similar Articles with Keyword 'parameters'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2045 - 2047

A Comparative Parameters Analysis of Different Round Robin Scheduling Algorithm using Dynamic Time Quantum

Payal T. Sonagara, Viral D. Sanghvi

Share this Article

Similar Articles with Keyword 'Shafer'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 388 - 398

Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET

Shirina Samreen, Dr. G. Narsimha

Share this Article

Similar Articles with Keyword 'Theory'

Downloads: 39

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2523 - 2525

Study of Semantic Retrieval by Data Similarity of Trademarks

Deepak Mali, P. D. Lambate

Share this Article
Top