IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A New Approach For Managing Maximum Energy And Malicious Attack Detection In WSN

[Full Text]

 

AUTHOR(S)

Dr. V.Selvi , R.Chinthamani

 

KEYWORDS

WSN, malicious attack, energy consumption, Blackhole Attack, Grayhole Attack, Packet Dropping Attacks, Sinkhole Attack

 

ABSTRACT

This paper deals about the energy consumption of the entire sensor network by taking into account of various constraints of energy consuming constituents of the network. Then increasing the overall lifetime of various topology of the wireless sensor networks by taking in to account the interconnection between energy consuming constituents and the most important parameters. Determining the effect of energy consuming constituents and their prevalent parameters based on overall energy consumption in WSN.

 

REFERENCES

J. Sebastian Terence and Geethanjali Purushothaman “A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks”, J Inf Process Syst, Vol.15, No.1, pp. 203~216, February 2019.
[2] K. S. Adu-Manu, N. Adam, C. Tapparello, H. Ayatollahi, and W. Heinzelman, “Energy-harvesting wireless sensor networks (EH-WSNs): a review,” ACM Transactions on Sensor Networks (TOSN), vol. 14, no. 2, p. 10, 2018.
[3] G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella,“Energy conservation in wireless sensor networks: a survey,” AdHoc Networks, vol. 7, no. 3, pp. 537–568, 2009.
[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci , “Wireless sensor networks: a survey,” Computer Networks, vol.38, no. 4, pp. 393–422, 2002.
[5] S. Soro and W. B. Heinzelman, “Cluster head election techniques for coverage preservation in wireless sensor networks,” Ad Hoc Networks, vol. 7, no. 5, pp. 955–972, 2009.
[6] C. Wang, J. Li, Y. Yang, and F. Ye, “Combining solar energy harvesting with wireless charging for hybrid wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 17, no.3, pp. 560–576, 2017
[7] H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detection and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.
[8] M. Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
[9] R. W. Anwar, M. Bakhtiari, A. Zainal, and K. N. Qureshi, “Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks,” Jurnal Teknologi (Science & Engineering), vol. 78, no. 4-3, pp. 75-81,2016.
[10] J.Hester, T. Scott, and J. Sorber, “Ekho: realistic and repeatable experimentation for tiny energy-harvesting sensors,” in Proceedings of the 12th ACM Conference on Embedded Networked Sensor Systems (SenSys ’14), pp. 1–15, New York, NY, USA, November 2014.