Wireless Sensor Network, Intrusion Prevention and detection, Key Distribution
Keywords:
Wireless Sensor Network, Intrusion Prevention and detection, Key DistributionAbstract
Tiny nodes capable of sensing the environment have become one of the popular trends in surveillance. Sensors are devices which are utilized in innumerable number of applications. These applications vary in size and functionality. Low cost of these motes makes them more liable to different types of attacks. Hence security becomes one of the primary necessities. To defend the network against such type of attacks, prevention and detection techniques come handy.
This paper adopts a simple analysis which can be adopted in applications which require less amount of security. In this paper, three-layer authentication is performed to secure the network from different attacks. The paper adopts cluster-based routing. The analysis is
done at the cluster level and based on the data obtained from the sensors, the base station performs comparative analysis, to analyze compromise node in the network. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.