Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
A Revised Approach on Attack Identification and Handling in WSN
Seema Khokher
Security is one of the most critical vectors for any network. When the network is an open adhoc network; this criticality also increases. Sensor network is one of such network that suffers from different kind of internal and external attacks. The internal attacks are more crucial for the network because it is done by the authenticated member nodes. These attacks affect the network by affecting the QoS parameters over the network. In this present; a layered architecture is presented to handle the internal attack in wireless sensor network and to provide the effective throughput over the network. The presented work is divided in three stages. In first stage; the network nodes are analyzed under the throughput; delay and energy consumption parameters. Based on this analysis; the first level critical nodes are identified. Now before deciding the nodes as the attacker nodes; these nodes are required to keep in observation. At the second stage; to observe the nodes; the effective monitoring node selection is defined in this work. To monitor each attacker nodes m observer nodes are identified under the coverage range and energy parameters. The analysis on these nodes is performed under different parameters such as PDR; energy loss; communication delay etc. Now at the third stage; the Dempster-Shafer theory will be applied on these parameteric evidence under different beliefs. Based on these belief oriented observation; the identification of the attacker node will be done..
Keywords: WSN Characteristic parameters, Dampster Shafer Theory, Attacker, Energy consumption
Edition: Volume 3 Issue 6, June 2014
Pages: 2171 - 2174
How to Cite this Article?
Seema Khokher, "A Revised Approach on Attack Identification and Handling in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014652, Volume 3 Issue 6, June 2014, 2171 - 2174
102 PDF Views | 83 PDF Downloads
Similar Articles with Keyword 'Attacker'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Similar Articles with Keyword 'Energy consumption'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1450 - 1456An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks
M. Devapriya, R. Sudha