Avoid Misbehaving Nodes for Secure Data Transmission in Wireless Sensor Networks
A.AbdulFaiz1, J.Amarnath2, P.Anitha3, B.Pradeep Kumar4
1A.AbdulFaiz, Department of Computer Science and Application Sri Krishna Arts and Science College.
2J.Amarnath, Department of Computer Science and Application Sri Krishna Arts and Science College.
3P.Anitha, Department of Computer Science and Application Sri Krishna Arts and Science College.
4B.Pradeep Kumar, Department of Computer Science and Application Sri Krishna Arts and Science College.
Manuscript received on 11 August 2019. | Revised Manuscript received on 16 August 2019. | Manuscript published on 30 September 2019. | PP: 8810-8814 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6506098319/2019©BEIESP | DOI: 10.35940/ijrte.C6506.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The open idea of the remote medium abandons it powerless against deliberate impedance assaults, normally alluded to as sticking. This deliberate impedance with remote transmissions can be utilized as a platform for mounting Denial-of-Service assaults on remote systems. Normally, sticking has been tended to under an outside danger demonstrate. Be that as it may, enemies with inner information of convention determinations and system insider facts can dispatch low-exertion sticking assaults that are hard to recognize and counter. In this work, we address the issue of particular sticking assaults in remote systems. In these assaults, the foe is dynamic just for a brief timeframe, specifically focusing on messages of high significance. We represent the benefits of particular sticking as far as system execution corruption and foe exertion by introducing two contextual investigations; a specific assault on TCP and one on navigation. We demonstrate that specific sticking assaults can be propelled by performing continuous bundle arrangement at the physical layer. To alleviate these assaults, we create three plans that avoid continuous parcel arrangement by joining cryptographic natives with physical-layer traits. We break down the security of our techniques and assess their computational and correspondence overhead.
Keywords: Misbehaving Node, Secure Data Transmission, Puzzle Gam
Scope of the Article: Network Protocols & Wireless Networks