Mitigation of Black Hole and Selective Forwarding Attacks through Active Trust Mechanisms in Wireless Sensor Networks

نویسندگان

چکیده

In modern times, security remains a significant concern in wireless networks. Wireless sensor networks are widely employed different practical situations. WSNs struggle with numerous internal and external threats, detecting defending against insider attacks is difficult. Insider attacks, which intruders discard received data packets selectively, pose risk to WSNs. The presence of black hole nodes within the network causes this issue. This research paper presents secure reliable route management methodology for that selects routing paths based on trust metrics. proposed mechanism employs intelligent node selection defend various types assaults encountered during process, including selective forwarding attacks. As result, identifies routes establishes routing. scheme uses throughput, latency, packet drop ratio as performance Experimentation demonstrates system effectively increases probability while extending lifecycle.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Selective Forwarding Attacks in Wireless Sensor Networks

Wireless sensor network has been grown as hottest research area for past few years. They have extensive applications; there are various areas in wireless sensor networks on which researchers are working. The area which have gain attention of almost every researcher is security, security of wireless sensor network has become very important since once deployed these networks are unattended and un...

متن کامل

Selective Forwarding Attack in Wireless Sensor Networks

Wireless mesh network represent a solution to provide wireless connectivity. There are number of assaults on remote sensor systems like dark gap attack, sink gapa attack, Sybil attack, selective sending and so on. In this paper we will focus on particular sending assault. Particular Forwarding Attack is one among the numerous security dangers in remote sensor systems which can debase arrange ex...

متن کامل

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

Detection of Selective Forwarding Attacks in Wireless Sensor Networks: A Survey

A Wireless Sensor Network (WSN) consists of distributed an autonomous devices that monitors both physical and environmental conditions. Sensor Networks are used for weather prediction and measuring temperature, sound, wave, vibration, pressure etc. Sensor Networks suffer from various security attacks like (i) sink hole attack, (ii) black hole attack, (iii) wormhole attack and (iv) selective for...

متن کامل

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of scientific research in computer science, engineering and information technology

سال: 2023

ISSN: ['2456-3307']

DOI: https://doi.org/10.32628/cseit2390395