Identifying the Intruders Using N-GSH and SRT in Wireless Sensor Network

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
Packet dropping and modification are the common attacks that can be launched by an adversary to disrupt communication in wireless sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks but very few can effectively and efficiently identify the intruders. To address this problem, the authors propose a simple yet effective scheme, which can identify misbehaving forwarders that drop and modify packets. Most of the bad nodes can be identified by their heuristic ranking algorithm. The alert message will be send to all the users in the network if there is any misbehaving actions occurred. Then the misbehaved node will be blocked and the messages cannot reach to that misbehaved nodes.
Download Now

Find By Topic