PERFORMANCE AND IMPACT ANALYSIS OF SPIN PROTOCOL UNDER SYBIL ATTACK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
Wireless sensor network is an emerging field of research and has attracted a lot of researchers because of its applicability in remote and hostile environments. Since wireless sensor networks communicate over an open wireless medium on specified radio frequencies, they are prone to interference as well as attacks. The intent of our study is to investigate the security of SPIN (Sensor protocol for Information via negotiation) protocol under active routing attack called Sybil attack. This paper summarizes the performance of SPIN under ideal conditions and under Sybil attack.
Authors and Affiliations
Rohit Choudhary
Direct and Indirect Discrimination Prevention in Data Mining
Discrimination is a presuppose privileges where provide to the each separate group for the safety of the data which is stored. Discrimination is two types, direct and indirect discrimination. Direct discrimination...
SECURE DATA HIDING USING ENCRYPTED SECRETE IMAGE
Steganography and Cryptography are two popular methods to sending information in a secrete way. Steganogaphy is use to hide secrete message and Cryptography is use to encrypt the message before sending. In this pa...
Stiffness Analysis of Actuator Flexure by FEM
Actuator is a fluid control component, which will be used in any of the fluid control requirements. The proposed actuator is normally closed and electro-mechanically actuated with armature configuration. The armat...
A STUDY AND REASEARCH ON MONITORING SYSTEM AND EMBEDDED WEB SERVER BASED AUTOMATION
Instead of PC based servers; ARM processor based servers are becoming trend of today’s market. Cost reduction is achieved using ARM processor along with Ethernet module as Embedded Web Server. Idea is utilized f...
Location Updation for Highly Dynamic and Scalable Ad Hoc Network in Geographic Routing
In geographic routing each node needs location information about other nodes in the network to forward data packets to the destination. If a node maintains location information about all the nodes in the network...