Abstract

This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.