International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
In a wireless sensor network, sensor nodes monitor the environment, detect events of interest, produce data and forward the data towards a sink which could be a gateway, base station or storage node. In wireless multi-hop sensor networks, an intruder may launch some attacks due to packet dropping in order to disrupt the communication. To tolerate or mitigate such attacks, some of the schemes have been proposed. But very few can effectively and efficiently identify the intruders. The proposed method is simple and so identifies the misbehaving forwarders that drop the packets. Extensive analysis and simulations can verify the effectiveness and efficiency of the scheme.