Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode, D. C. Mehetre
Wireless Sensor Networks are used worldwide across the Globe for communication in networks. Such Wireless Sensor Networks are easily vulnerable for range of attacks. The range of Adversaries attacks can also be easily launched in the wireless network. The paper presents the newly generated models GMFAD and CDAL-M which makes use of the physical property mainly Received Signal Strength associated with each node of network. It mainly focuses on received signal strength means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on detecting Identity based Adversaries attack and number of attackers in the cluster network also localizing the actual position of attackers. Also this paper can be used for Detecting Denial of Service attacks and localizing their position. The experimental results show that this advanced model doesnt require any additional efforts and also extra modifications to the existing. Hence topic depict that this models gives the advanced security management as compared to the existing cryptographic security techniques.
Keywords: GMFAD, CDAL-M, RSS, DoS, WSN
Edition: Volume 4 Issue 6, June 2015
Pages: 2386 - 2390
How to Cite this Article?
Santosh S. Doifode, D. C. Mehetre, "GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155930, Volume 4 Issue 6, June 2015, 2386 - 2390
Similar Articles with Keyword 'RSS'
Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Indoor Tracking Using Wi-Fi Routers on a Smartphone
Rutujit K. Diwate, D. N. Rewadkar
Similar Articles with Keyword 'DoS'
Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Similar Articles with Keyword 'WSN'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia