In Wireless Sensor Network (WSN), fact from different sensor nodes is collected at assembling node, which is typically complete via modest procedures such as averaging as inadequate computational power and energy resources. Though such collections is identified to be extremely susceptible to node compromising attacks. These approaches are extremely prone to attacks as WSN are typically lacking interfere resilient hardware. Thus, purpose of veracity of facts and prestige of sensor nodes is critical for wireless sensor networks. Therefore, imminent gatherer nodes will be proficient of accomplishment additional cultivated data aggregation algorithms, so creating WSN little unresisting, as the performance of actual low power processors affectedly increases. Iterative filtering algorithms embrace inordinate capacity for such a resolution. The way of allocated the matching mass elements to information delivered by each source, such iterative algorithms concurrently assemble facts from several roots and deliver entrust valuation of these roots. Though suggestively extra substantial against collusion attacks beside the modest averaging techniques, are quiet vulnerable to a different cultivated attack familiarize. The existing literature is surveyed in this paper to have a study of iterative filtering techniques and a detailed comparison is provided. At the end of this paper new technique of improved iterative filtering is proposed with the help of literature survey and drawbacks found in the literature.
Currently the Wireless Networks are used worldwide across the Globe. Such Wireless Networks are easily susceptible for variety of attacks. The variety of Spoofing attacks can also be easily launched in the wireless environment. Here this paper presents the new enhanced technique which makes use of the physical property mainly-RSS (The Received Signal Strength) associated with each node. It mainly focuses on RSS means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on-Detecting Identity based spoofing attack, Determining number of attackers in the cluster network, Localizing and determining the actual position of attackers. Also this can further be used for Detecting Denial of Service attacks and Man in the Middle Attack. The experimental results show that this enhanced form doesn't require any additional efforts and also doesn't require extra modifications to the existing. Hence such things depict that this technique gives the enhanced security management as compared to the existing security techniques.
The sensors in the WSN sense the adjacent, collects the data and deliveries the data to the sink node. It has been noticed that the sensor nodes are deactivated or damaged when obvious to committed radiations or due to energy problems. This damage leads to the transient parting of the nodes from the network which procure in the building of the holes. These holes are dynamic in nature and can spread and pact dependent upon the features causing the damage to the sensor nodes. So a solution has been reachable in the base paper where the twin mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be transferred smoothly. Grounded on this a survey has been done where some problems are considered so that the performance of the system can be enhanced.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.