International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Detection and Mitigation of Greyhole Attack in Wireless Sensors Network Using Trust Mechanism

Bansi S. Kantariya, Dr. Narendra M. Shekokar

Wireless sensors networks are generally deployed in mission critical environment. The nodes in the network are generally unattended and hostile environment in which they are deployed make the network vulnerable to many attack. One such attack is greyhole attack where the attacker selectively drops the packets in its path to sink or base station. Greyhole attack may reduce the network throughput or even lead to failure in the mission for which the network is deployed. So it becomes necessary to detect such attacks and mitigate it. Detection of greyhole attack is difficult as compare to other form of attack because the node implementing such attacks is the legitimate node having all the necessary cryptographic information. In this paper we have proposed the mechanism to detect and mitigate greyhole attack. We have used trust mechanism to detect the attack. Trust mechanism will calculate the trust value of the node in network which is similar to the concept of trust in human society and then this trust value is use to detect the malicious activity in our case packet dropping. We have used task completion and energy consumption as the parameters for calculating the trust value. There can be a situation where attacker can manipulated its attacking strategies to avoid itself from being detected. Our detection mechanism has also taken care of such situation.

Keywords: Wireless sensors network, Greyhole attack, Trust mechanism

Edition: Volume 4 Issue 4, April 2015

Pages: 2500 - 2506

Share this Article

How to Cite this Article?

Bansi S. Kantariya, Dr. Narendra M. Shekokar, "Detection and Mitigation of Greyhole Attack in Wireless Sensors Network Using Trust Mechanism", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153630, Volume 4 Issue 4, April 2015, 2500 - 2506

Enter Your Email Address


Similar Articles with Keyword 'Wireless sensors network'

Downloads: 100

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Similar Articles with Keyword 'Wireless'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'sensors'

Downloads: 4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Downloads: 100

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Similar Articles with Keyword 'network'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'attack'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Trust'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'mechanism'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top