Author:
Aparnaa M,Dhanush Krishna S,Amaran Sibi,Maheswari S,Soundarya R
Abstract
Abstract
Any system or network is always susceptible to attacks. If an adversary has access to the network, they may disrupt the network in several ways. Sybil attack, selective forwarding, tampering, etc., are some of the attacks that disrupt the network. If the sensor network is employed in critical areas such as warzones or border protection systems, any attack or breach of security may prove to be fatal. Therefore, proper security mechanisms have to be integrated into the system to ensure that the data remains secure. In our project, we intend to identify and isolate the compromised nodes that selectively forwards data packets. The proposed protocol uses a reputation based system to determine the integrity of the neighboring nodes. Once a compromised node has been identified, that node is excluded from further communication after verification from base station.
Subject
General Physics and Astronomy
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献