International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh [2] | Vaibhav Pandey


Abstract: Wireless sensor network becomes increasingly popular with the development in technology. It can provide enormous amount of services for the benefit of mankind. But due to its limitations in memory and other resources it is very much prone security attacks; selective forwarding attack is one that security attacks which can affect the whole sensor network communication. The variety of defense scheme has been proposed against selective forwarding attack. In this paper we have describe some of the existing defense scheme against selective forwarding attack.


Keywords: Selective forwarding attack, Wireless sensor Network, security, Distributed, Centralized


Edition: Volume 3 Issue 6, June 2014,


Pages: 2786 - 2790


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Harpal Singh, Vaibhav Pandey, "Survey: Detection Schemes Against Selective Forwarding Attack", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 2786-2790, https://www.ijsr.net/get_abstract.php?paper_id=02014822

Similar Articles with Keyword 'Selective forwarding attack'

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2167 - 2171

MAS-AODV: Mobility Aware Secure AODV to Prevent Gray Hole Attack in MANETs

Namrata Jain | Yogesh Rathore [3]

Share this Article

Downloads: 116 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1191 - 1196

Lightweight Key Distribution for Secure Routing and Secure Information Propagation

Anubha Goyal | Geetanjali Babbar

Share this Article
Top