DocumentCode :
1642949
Title :
Reactive security scheme using behavioral aspects of attacks for Wireless Sensor Networks
Author :
Ahmed, Roshan Zameer ; Anigol, Anusha ; Biradar, Rajashekhar C.
Author_Institution :
Electron. & Commun., Reva Inst. of Technol. & Manage., Bangalore, India
fYear :
2013
Firstpage :
1023
Lastpage :
1028
Abstract :
Wireless Sensor Networks(WSN) are vulnerable to many types of hackers who might get into the network with the intent of fetching its significant data and destroying the network. The sink node in WSN that maintains the database of entire network is also prone to security violations and there is no such security mechanism devised for communicating the data to other nodes. Hence, there is a need to design security scheme with the capabilities to protect the network and the sink node on the occurrence of attack. In this paper, we aim to provide security with a reactive security scheme that includes studying the behavioral aspect of attacks and congregating the security demands. This scheme successively conglomerates the security and the network rescue mechanism free from attacks and their impacts on the network. The simulation results such as Packet Delivery Ratio(PDR), Malicious node activity, Delay, Transmission power depict various attack behaviours in WSN along with the Reception power rate observed by the sink node and the Packet loss.
Keywords :
computer crime; telecommunication computing; telecommunication security; wireless sensor networks; PDR; WSN; attack behavioral aspects; hackers; malicious node activity; network database; network rescue mechanism; packet delivery ratio; packet loss; reactive security scheme; reception power rate; security demands; security violations; sink node; transmission power; wireless sensor networks; Delays; Informatics; Intrusion detection; Monitoring; Packet loss; Wireless sensor networks; Reactive Mechanism; Security; Sink Node; Wireless Sensor Network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on
Conference_Location :
Mysore
Print_ISBN :
978-1-4799-2432-5
Type :
conf
DOI :
10.1109/ICACCI.2013.6637317
Filename :
6637317
Link To Document :
بازگشت