scholarly journals A Trust Model for Security Against Black Hole Attack in Hierarchical Cluster Based Wireless Sensor Network

2019 ◽  
Vol 8 (4) ◽  
pp. 12645-12650

Wireless Sensor Network (WSN) is widely gaining fame since it has theoretically unavoidable unlimited applications. Security stays a significant challenge for WSN because for a few feeble substances like open remote medium, dynamic topology, absence of centralized infrastructure and intermittent network connectivity. Dark gap assault is a sort of Denial of Service (DoS) attack, which influences reliability of a system by diverting and dropping genuine packets in the system. Black hole attack ends up being progressively extraordinary when number of threatening nodes participate to show Black hole attack in the framework, which is named as a helpful black hole attack. In this paper, we showed an Enhanced Detection and Prevention Mechanism for Black hole Attack (EDPMBA) Trust Model to save the assurance from single and helpful black hole attack. EDPMBA additionally shows better execution as far delay and packet conveyance proportion.

2018 ◽  
Vol 24 (3) ◽  
pp. 1791-1794 ◽  
Author(s):  
Khairul Akram Zainol Ariffin ◽  
Rozita Mohd Mokhtar ◽  
Abdul Hadi Abd Rahman

2019 ◽  
Vol 148 ◽  
pp. 552-561 ◽  
Author(s):  
Hanane Kalkha ◽  
Hassan Satori ◽  
Khalid Satori

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


Sign in / Sign up

Export Citation Format

Share Document