International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 143 | Views: 234 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Rating: 6.6 / 10


A Modified Algorithm and Protocol for Replica Attack Prevention for Wireless Sensor Network

Dharmendra Singh Chouhan [2] | Pritesh Jain [2]


Abstract: Wireless networks are achievement recognition to its height nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It's an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. So as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Replication attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Replication attack for each protocols is taken under consideration. The impact of Node Replication attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).


Keywords: WSN, Replication attack, AODV Routing Protocols, NS-235


Edition: Volume 6 Issue 4, April 2017,


Pages: 185 - 189


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top