DETECTION OF MALICIOUS NODES IN WIRELESS SENSOR NETWORK
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff3e572b0000004426060001000100
Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.

Authors
M Babu1, M Ramkumar2, M Shenbagapriya3
Gnanamani College of Technology, India1,2, Sri Satya Sai University of Technology and Medical Sciences, India3

Keywords
Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 10 , Issue: 4 , Pages: 2067-2072 )
Date of Publication :
December 2019
Page Views :
108
Full Text Views :
2

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.