z-logo
open-access-imgOpen Access
Avoid Misbehaving Nodes for Secure Data Transmission in Wireless Sensor Networks
Author(s) -
Ayaan Faiz,
J.Jegan Amarnath,
P. Anitha,
B.Pradeep Kumar
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.c6506.098319
Subject(s) - computer security , overhead (engineering) , computer science , physical layer , transmission (telecommunications) , wireless , computer network , telecommunications , operating system
The open idea of the remote medium abandons it powerless against deliberate impedance assaults, normally alluded to as sticking. This deliberate impedance with remote transmissions can be utilized as a platform for mounting Denialof-Service assaults on remote systems. Normally, sticking has been tended to under an outside danger demonstrate. Be that as it may, enemies with inner information of convention determinations and system insider facts can dispatch lowexertion sticking assaults that are hard to recognize and counter. In this work, we address the issue of particular sticking assaults in remote systems. In these assaults, the foe is dynamic just for a brief timeframe, specifically focusing on messages of high significance. We represent the benefits of particular sticking as far as system execution corruption and foe exertion by introducing two contextual investigations; a specific assault on TCP and one on navigation. We demonstrate that specific sticking assaults can be propelled by performing continuous bundle arrangement at the physical layer. To alleviate these assaults, we create three plans that avoid continuous parcel arrangement by joining cryptographic natives with physical-layer traits. We break down the security of our techniques and assess their computational and correspondence overhead

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here