Loading...
Please wait, while we are loading the content...
Similar Documents
Detecting, Determining and Localizing Multiple Attacks in Wireless Sensor Network
| Content Provider | Semantic Scholar |
|---|---|
| Author | Rajalakshmi Umamaheswari |
| Copyright Year | 2014 |
| Abstract | In wireless and sensor network are deployed, they will increase malicious attacks. Faking approaches are represent in the form identify compromise and can provide a variety of traffic injection approach a reducing the performance of network. To avoid faking approach to detect the presents of various type of attacks and eliminate them from the network. To handle these attack to apply cryptography authentication, RSS, cluster based mechanism and support vector machines rule requires additional infrastructure overhead and achieve ninety percentage hit ratio. In this paper, I take a different method by using physical property associate wireless transmission to detect Sybil and worm hole attacks, results achieve over ninety six percent hit ratio and Precision when defining the sybil, worm and black hole attacks, Internet Protocol address faking approach and distributed algorithm measures and localizing this medium access control address faking approach. Our approach proposed blast efficiently and separately. Another proposed local monitoring algorithm monitors the neighbour node locally, based on the malicious information from neighbour nodes the attacker form its surroundings is detected and localized. This kind of monitoring process works on overall network. After localization malicious nodes are eliminated from the network. |
| Starting Page | 1813 |
| Ending Page | 1816 |
| Page Count | 4 |
| File Format | PDF HTM / HTML |
| DOI | 10.1166/asl.2014.5698 |
| Volume Number | 20 |
| Alternate Webpage(s) | http://www.arpnjournals.com/jeas/research_papers/rp_2015/jeas_0615_2211.pdf |
| Alternate Webpage(s) | https://doi.org/10.1166/asl.2014.5698 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |