Implementation of Throughput Efficiency of TARF: A Trust-Aware Routing Framework for WSNs

Download Now
Provided by: International Journal for Development of Computer Science & Technology (IJDCST)
Topic: Networking
Format: PDF
Multi-hop routing in wireless sensor networks offers little protection against deception through replaying routing information. A resister will exploit this defect to launch numerous harmful or even devastating attacks against the routing protocols, together with wormhole attacks, sinkhole attacks, and Sybil attacks. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. To secure multi-hop routing in WSNs against intruders exploiting the replay of routing information.
Download Now

Find By Topic