
Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm
Author(s) -
R. Ramalakshmi,
Suma Prabhu,
C. Balasubramanianb
Publication year - 2020
Publication title -
aptikom journal on computer science and information technologies
Language(s) - English
Resource type - Journals
eISSN - 2528-2425
pISSN - 2528-2417
DOI - 10.34306/csit.v1i3.59
Subject(s) - wireless sensor network , computer science , computer network , node (physics) , news aggregator , sensor node , key distribution in wireless sensor networks , dependability , wireless network , wireless , engineering , telecommunications , software engineering , structural engineering , operating system
The sensor network is used to observe surrounding area gathered and spread the information to other sink.The advantage of this network is used to improve life time and energy. The first sensor node or group of sensor nodesin the network runs out of energy. The aggregator node can send aggregate value to the base station. The sensornode can be used to assign initial weights for each node. This sensor node calculates weight for each node. Whichsensor node weight should be lowest amount they can act as a cluster head. The joint node can send false data to theaggregator node and then these node controls to adversary. The dependability at any given instant represents ancomprehensive behavior of participate to be various types of defects and misconduct. The adversary can sendinformation to aggregator node then complexity will be occurred. These nodes are used to reduce the energy andband width.