alexa Routing Attack Discovery in WSN
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Routing Attack Discovery in WSN

J. Sabatini1, Mrs. K. Vanitha, M.E., (Ph.D)2
  1. II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamilnadu, India
  2. Assistant Professor, Dept. of CSE, Al-Ameen Engineering College, Erode, Tamilnadu, India
Related article at Pubmed, Scholar Google


Sensor devices are small devices used to capture information from environment. Capture, store and transmission are the main operations of sensor devices. Temperature, humidity, density of carbon dioxide and pressure details are captured by sensor devices. Battery power is the main limitation of sensor devices. The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised/vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network domain. Denial of communication is raised at the routing or medium access control levels. Resource depletion attacks are initiated at the routing protocol layer to permanently disable networks by consuming the battery power. Vampire attacks disrupt the network resources at the routing protocol levels. Stateful (Link state and distance vector) protocols and stateless (Dynamic Source Routing) protocols are verified with attacks. Clean-slate secure sensor network routing protocol is modified to control vampire attacks with resource usage analysis. Clean-slate secure sensor network routing protocol is improved with optimal boundary estimation model. Topology estimation and packet forwarding prediction is integrated. Transmission coverage factors are integrated with the detection scheme. Energy levels and forwarding packet count information are analyzed to improve the network lifetime.

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version