Prevention of Spoofing Offensive in Wireless Sensor Networks

  • Authors

    • U Lakshmi Sowmya
    • M Sai Kumar reddy
    • K Madhu Babu
    • Dr K.V.D.Kiran
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10974
  • hubs, Sensor systems, signature, Techniques, AODV
  • Abstract

    Remote sensor systems are powerless against assaults identified with data fraud and wholesale fraud. Albeit different techniques have been forced to recognize and find assailants, it doesn't concentrate on keeping the hub from assaulting. In this paper, we propose to demonstrate how the hostile of wholesale fraud and pantomime, for example, the surge hostile, happens when the surge hostile sends exhaust parcels to upset the information sent by the hub and side tracks the foe bundles at various way. Utilizing the neighboring hub signature confirmation strategy by mailing the keys to the hubs by key supplier whatever keeps the hub from being assaulted. The  most  limited  way  between  the  source  hub  and  the  goal  hub  was  chosen  utilizing  the AODV. Counteractive action instrument will be exceptionally valuable for snappy distinguishing proof of assailants and furthermore enhance the execution of the structure.

     

     
  • References

    1. [1] Sharma.p,Trivedi,A “An Approach to Defend Against Warm hole offensive In Ad HoUsing The Digital Signature†Communication Software and Networks(ICCSN) 2011 IEEE 3rd International Conference on may 2011.

      [2] Youngsoo Kim, Daejeon, Jungchan Na, Seungwon Sohn “A Secure Method For Transferring Active Packet Using The Digital Signature Schemes†Telecommunications, 2003. ICT 2003. 10th International Conference Vol.01 on 23 Feb 2003 .

      [3] Zhijun Li and Guang Gong “On The Node Clone Detection In Wireless Sensor Networks†IEEE/ACM Transactions on networking,

      [4] Saman Taghavi Zargar, James Joshi, Da- vid Tipper “A Survey of Defence Mechanisms Against Distributed Denial of Service(DDoS) Floodis†IEEE Communications Surveys & Tutorials Vol.15 Fourth Quarter 2013

      [5] Joshi, Y, Das, D. ; Saha, S.â€Mitigating Man in the Middle offensive Over Secure Socket Layer†on Internet Multimedia Services Architecture and appliancess (IMSAA), 2009 IEEE International Conference on Dec.2009.

      [6] Guha,R.K.Furqan, Zeeshan ,Muhammad, Shahabuddin “Discovering Man in The Middle Attacks in Authentication protocolsâ€Military Communications Conference, 2007. MILCOM 2007. IEEE on 31 oct 2007.

      [7] Chakeres, I.D. Belding-Royer, E.M. "AODV Routing Protocol Design Implementation†Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on march 2004

      [8] Royer, E.M. “An Implementation Study of the AODV Routing Protocol†Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE Vol.3 Sep 2003â€

      [9] K.V.D.KIRAN,â€Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for Healthcare,†International Journal of BioScience and BioTechnologyâ€, Vol.7, No.3 (2015), pp.243-250, ISSN: 2233-7849 IJBSBT

      [10] K.V.D.KIRAN,â€A Critical study of information security risk assessment using fuzzy and entropy methodologies,â€InternationalJournalon Computersand

      Communicationsâ€.

  • Downloads

  • How to Cite

    Lakshmi Sowmya, U., Sai Kumar reddy, M., Madhu Babu, K., & K.V.D.Kiran, D. (2018). Prevention of Spoofing Offensive in Wireless Sensor Networks. International Journal of Engineering & Technology, 7(2.7), 770-773. https://doi.org/10.14419/ijet.v7i2.7.10974

    Received date: 2018-04-02

    Accepted date: 2018-04-02

    Published date: 2018-03-18