AN EFFICIENT APPROACH FOR ELIMINATING THE SYBIL, SINKHOLE, AND WORMHOLE ATTACK IN WSN

Main Article Content

Ekta Singh Parihar
Khushboo Agarwal
Jaimala Jha

Abstract

A WSN having the extensive collection of sensor nodes which are able to sensing, processing and communicating they helps the base station to send and received information according to the situation in a meticulous environment. WSNs are susceptible in security area, there may be so many malicious activities are possible in the network. When some security attack occurs into the network, an IDS is used to distinguish the malicious nodes into the network as early as possible and generate some alert to take further action against malicious nodes. WSN is the extensive area of network, where lots of work done regarding security. Although, security is not fully preserve in WSN so in existing technique there are plenty of issues. By using Mac- duration they only recognize wormhole attack not all mention attack. This work done only when three way hand shaking happen but due to mobility network scenario change. There is no technique to prevent attacks. To resolve these difficulties, we performed some scenario to intercept the network from the wormhole, Sybil and sinkhole attack.

Downloads

Download data is not yet available.

Article Details

Section
Articles