alexa Enhanced Detection of Packet Droppers And Modifiers In
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Enhanced Detection of Packet Droppers And Modifiers In Wireless Sensor Networks

 
To read the full article Peer-reviewed Article PDF image

Abstract

There are several emerging trends in the field of networks, out of which Wireless Sensor Networks(WSN) are gaining importance recent years due to its impact on Cost, ability to cope up with node and communication failures, Mobility, Capability to withstand harsh environmental condition, monitoring purpose and Ease of use. Despite Sensor nodes large collection of benefits there are few constrains such as Security, Quality of Service and Resource constrains which act as hurdle in implementing sensor network application in real world environment. Security is considered to be a critical parameter in Sensor network due to the fact that they are mostly deployed in an environment where human interaction is less. An opponent or intruder is one who may perform various attacks on packets in order to make a node compromise and cut short the communication to take place. Attacks that have been concentrated here are packet dropping and modification. Sensor applications are time critical and if compromised nodes are not detected, large quantities of irrelevant data can be injected into the network which in turn will have a greater impact on computational cost and storage overhead. In this paper Node Categorization and Heuristic Ranking (NCHR) is used along with our proposed scheme of energy consumption and delay aspects to identify compromised nodes and further a Secure Routing and Encryption techniques are provided to ensure reliable communication.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords