slugA Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in Wireless Sensor Networks

Abstract

This Paper reviews about the wireless sensor networks architectures, applications, characteristics, benefits, types of wireless sensor networks and attacks and their detection and prevention techniques of attacks. Wireless sensor networks are increasingly deployed in a variety of applications a like military application and medical, monitoring the climate, commercial and home application and so on .The aim of this paper is to make sensor network secure from various attacks. In black hole attack the set of nodes re-program the nodes and block the packet forwarding to the base station In this paper, we present a survey of the main types of attack at in wireless sensor network and then we review detection and prevention techniques used in wireless sensor networks. We classify these techniques of detection and prevention and comparison of these techniques is also included in this paper.

Authors and Affiliations

Jaspreet Kaur, Tavleen Kaur

Keywords

Related Articles

Audio Encryption with AES and Blowfish

With the rapid growth of information and communication industry, data transfer, communication of information, storing of data in cloud, sharing of valuable information across networks, raised the need of security of dat...

Pharmacological Investigation of Ethanolic Extract of Roots of Holoptelea Integrifolia (Roxb.)Plench

The present study deals with pharmacological studies of ethanolic extract of roots of H. integrifolia (Roxb.) Planch (Family: Ulmaceae) . The ethanolic extracts of roots were examined for antimicrobial studies by using...

Power Analysis of Sequential Circuits Using MultiBit Flip Flops

In today's VLSI technology, power is the major issue with shrinking technology. Clock will play important role in the integrated circuits. In this paper, Multi-bit flip flop technique has been introduced to reduce clock...

Prime Numbers and Modular Exponentiation in Encryption and Decryption

The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...

Congestion Control Inventive Approach for Active Queue Management System in Wireless Network

The extensively studied literature in the context of wired networks is the Active Queue Management (AQM) algorithms. In this paper, we have used kalman filter in a inventive way. This paper presents recommendations to t...

Download PDF file
  • EP ID EP17786
  • DOI -
  • Views 355
  • Downloads 12

How To Cite

Jaspreet Kaur, Tavleen Kaur (2014). slugA Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in Wireless Sensor Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(3), -. https://europub.co.uk/articles/-A-17786