Call For Paper Volume:5 Issue:8 Aug'2018 |

Survey on Detecting the Attacks in Wireless Sensor Networks

Publication Date : 29/09/2015

Author(s) :

T.Janaranjani , P.Balamurugan , V.Sharmila.

Volume/Issue :
Volume 2
Issue 9
(09 - 2015)

Abstract :

A wireless Sensor Network (WSN) consists of autonomous sensors which are spatially distributed in order to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. the data is then cooperatively passed through the network to a main location. Sensor node data values are transferred through multi hop data transmission models. Secure provenance verification schemes are used to authorize the data packets. Efficient Distributed Trust Model (EDTM) is integrated with provenance verification scheme for node and data level trust analysis. Packet drop attack detection process is improved with time bounded verification mechanism. When transferring the data to the base station through the intermediate node there the attack happens. To detect the attacks this paper choose provenance concept. Provenance will checks the data should be coming from the particular source or simply it gives the trust of the node.

No. of Downloads :



Web Design MymensinghPremium WordPress ThemesWeb Development

Survey on Detecting the Attacks in Wireless Sensor Networks

September 21, 2015