slugPerformance Evaluation of Routing Protocols for Anomaly Detection

Abstract

Wireless sensor network is a data centric network consisting of a number of sensor nodes that work cooperatively to form an infrastructure less network. The sensing technology combined with processing power and wireless communication makes it being available for a number of futuristic applications. Anomalies in Wireless sensor networks coerce it to perform denial of service. Anomaly detection plays a vital role in securing a network from obliteration. Anomaly detection addresses a detection technique based on Hypothesis testing. It performs the detection technique using routing protocols such as AODV, DSDV and DSR and network performance is analyzed. It concludes that DSR has better performance with some tradeoffs when compared to the other routing protocols we analyzed.

Authors and Affiliations

Rani. T. P, JayaKumar. C

Keywords

Related Articles

Literature Review on Mathematical Model Based Analysis of Conventional Machining of Ferrous and Non-Ferrous Materials

Conventional machining is a complex phenomenon which includes the workers who operate the machines as well as the working environment. In most of the country majority of the machining operations are still executed manua...

Study of Static Vs Dynamics Methods for Study of High Pressure Behaviour of Solids

There has been considerable interest in the study of structural phase-transition and high pressure behavior of solids due to their technological and geophysical importance. Therefore, a number of experimental and theore...

Review: An Access Point-Based Fec Mechanism for Data Transmission over Network

Video transmission over the wireless network faces many challenges. The most discriminating test is identified with bundle misfortune. To defeat the issue of bundle misfortune, Forward Error Correction is utilized by in...

Implementation of Polar Codes in 5g

A new proposed method for constructing codes that achieves the symmetric capacity, (the capacity of the channel with the same probabilities for the inputs), I (W) , of any Binary Discrete Memoryless Channel W (BDMC) and...

Evaluating Code Clone Techniques

In the last decade, several researchers have investigated techniques to detect duplicated code in programs exceeding hundreds of thousands lines of code. All of these techniques have known merits and deficiencies, but a...

Download PDF file
  • EP ID EP18117
  • DOI -
  • Views 279
  • Downloads 8

How To Cite

Rani. T. P, JayaKumar. C (2014). slugPerformance Evaluation of Routing Protocols for Anomaly Detection. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(5), -. https://europub.co.uk/articles/-A-18117