Data Prevention from Network Hacking

Abstract

We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate source nodes by analyzing transmission paths. So there is lot of chances to lose data and information theft by network hackers. Network hackers performs eves dropping, sniffers attack, Denial of service attack. These types of attacks are achieved by negative commands generated by intermediate server maintained by hackers. With the popularity of the Internet of Things (IoTs) in recent years, source privacy protection has attracted a lot of attentions. However, they fail to get the tradeoff between multi-path transmission and transmission cost. In this project, we propose a Constrained Random Routing (CRR) mechanism and Greedy techniques, which can constantly change routing next-hop instead of a relative fixed route so that attackers cannot analyze routing and trace back to source nodes. At first we designed the randomized architecture for each sensor nodes. Then calculate the coordinates and weights of node, Finally, the selected weights help to decide which node will become the next hop. In this way, attackers would be confused by the constantly changing paths. The simulation results prove that our proposal can achieve high routing efficiency in multi-path transmission. A Prasanth | P Sankar Ganesh | S P Raja Gopalan"Data Prevention from Network Hacking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11035.pdf http://www.ijtsrd.com/engineering/computer-engineering/11035/data-prevention-from-network-hacking/a-prasanth

Authors and Affiliations

Keywords

Related Articles

Effect of Voltage Sag on an Induction Motor

The aim of this paper is to analyze the performance of the three-phase squirrel cage induction motor under various voltage fluctuation levels. Generally, Induction motor drives are preferred for its simple and easy contr...

Design and Development of Catalytic Converter for Reduction of Pollution by Using Transient and CFD Analysis

The use of fossil fuels in automobiles mainly HC, CO and NOX which produce harmful green house gases. The main objective of catalytic converter is to reduce and control effect of harmful pollutants by converting toxic CO...

A Comparison of the use of Language in Ifeoma Okoye's Men without Ears and Ayi Kwei Armah's the Beautyful ones are not yet Born

This paper compares the use of language by both writers '“ Okoye and Armah to portray the social ills prevalent in their societies: Nigeria and Ghana. A comparative study of this kind is a useful dynamic and heuristic to...

Security Enhancement Using NTRU Algorithm Based Cryptosystem for Communication of Classified Information Via Cloud

Distributed storage depends on exceptionally artificial foundation and encourages available boundary point, flexibility and versatility it can oversee profoundly dimensions and tedious information. Henceforth, subcontrac...

Application OF IoT in Military Service

Internet of Things (IoT) links the objects of the real world to the virtual world, and enables anytime, anywhere connectivity for anything that has an ON and OFF switch. It constitutes to a world where physical objects a...

Download PDF file
  • EP ID EP359850
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

(2018). Data Prevention from Network Hacking. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-359850