The goal of a wireless sensor network (WSN) is to connect numerous
nodes via a multi-hop self-organizing network. A variety of sensor
nodes are arranged and positioned in relation to other nodes to provide
safe data exchange. Sensor nodes watch as a sink node processes the
data. The network includes a variety of assaults, including floods,
wormhole, black hole, sinkhole, and so on. One of the most challenging
tasks in WSN is secure routing because of the existence of attacks. The
technology of attack detection is employed to identify attacks and
enhances the security of data transmission. It provides a way to ignore
network threats, enabling secure communication. Most recent efforts
have been focused on implementing secure data communication in
wireless sensor networks. However, the more accurate detection attack
was not achieved. Numerous intrusion attackers are available to
compromise network data packet communication. To provide better
data distribution amongst soldiers in a combat environment, this
wireless network invader node needs to be identified. Hence, in a WSN
context, data transmission with a military scenario entails armed men
engaged in combat, such as fighter aircraft, tankers, and shot ships.
Finding intrusion attackers is a difficult task, especially in the highly
dynamic military wireless sensor network. Therefore, different
techniques are developed in WSN for achieving attack detection
accuracy with minimal delay and maximum data delivery rate.
S. Rajesh1, M.S. Premapriya2, A. Jayasmruthi3, V. Muthu Lakshmi4 Sri Ramakrishna Institute of Technology, India1,3, Anna University Regional Campus, Coimbatore, India2, Sri Ramakrishna Engineering College, India4
WSN, Secure Routing, Black Hole Attack Detection, Floods, Sink Hole Wormhole, Certificateless Signcryption Secure Communication
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 5 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 15 , Issue: 3 , Pages: 3248 - 3253 )
Date of Publication :
September 2024
Page Views :
84
Full Text Views :
9
|