Loading...
Please wait, while we are loading the content...
Similar Documents
An Efficient and Secure Method for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Kumar, Vijay Sagar, Dayananda Venkatesan, V. Prasanna |
| Copyright Year | 2017 |
| Abstract | A Lightweight Secure Scheme for Detecting In computer networking, a packet drop attack or black hole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool. Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent. In Wireless Sensor Networks. Wireless Sensor Network is broadly used in many application domains. These nodes collect data from many sensor nodes. There are many promising attacks like provenance forgery, Packet drop attack, Jamming attack etc. are found in the WSN while transmitting the data. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decisionmaking. Data provenance keeps log information of data about who accessed this data, who modified this data, the path from the data is traversed etc. Data provenance has important role in the evaluation of trustworthiness of data therefore, it is important to secure data provenance. The packet drop attack can be frequently deployed to attack wireless sensor network. The malicious router can also accomplish this attack selectively. The several challenging requirements for provenance management and packet drop attacks in sensor networks are low energy and low bandwidth consumption, competent storage and secure transmission. In this paper focus on Provenance Forgery attack, Packet Loss and Detection methods in Wireless Sensor Network. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ijmetmr.com/olmay2017/VijayKumarDA-SVenkatesan-70.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |