z-logo
open-access-imgOpen Access
Node Validation Technique to Increase Security of Wireless Sensor Networks
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i1138.0789s19
Subject(s) - node (physics) , computer network , computer science , wireless sensor network , intrusion detection system , sort , network security , computer security , wireless network , wireless , engineering , telecommunications , structural engineering , information retrieval
A distributed sort of network in which sensor nodes can join or leave the network when they want is identified as wireless sensor network. Due to self-arranging of the network, attacker nodes make their entry inside networks and launch different types of active and passive intrusions. The active attacks can be divided into various sub categories and one of them is misdirection attack. This attack increases delay in the network. The available attacker hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is proposed in this work. The malicious nodes are recognized from the networks which are in charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion. This intrusion streams fake recognition information within the network. This study proposes a verification approach for detecting attacker nodes present in the network. The performance of introduced approach is tested in NS2. It is scrutinized that performance is improved as per various parameters.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here