Loading

Implementation of Wireless Sensor’s Integration Possibilities and Attacks on Wireless Network Control
Poonkodi.R1, N. SaravanaSelvam2
1Ms.Poonkodi.R, Assistant Professor, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamilnadu, India.
2Dr.N. SaravanaSelvam, Professor, Department of ECE, PSR Engineering College, Sevalpatti, Sivakasi. Tamilnadu, India.

Manuscript received on November 12, 2019. | Revised Manuscript received on November 25, 2019. | Manuscript published on 30 November, 2019. | PP: 5625-5630 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8483118419/2019©BEIESP | DOI: 10.35940/ijrte.D8483.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Collection of independent sensor nodes is primarily used as a combination of wireless detection and data networks are called wireless sensor networks (WSN). Wireless networks face many unacceptable security threats as these types of sensors are used primarily in many critical tasks such as military applications, claims management, environmental conditions, health applications, and more. Although the energy problem of the sensor network is more critical due to the absence of sensor nodes. The suggestion that other classes of source-based attacks are referred to as vampire attacks. Vampire attacks result in greater use of power during message delivery, which in turn prevents the entire network from quickly emptying node batteries. Because it uses protocol complaint messages to create attacks that make it difficult to detect and prevent. In this article, we intend to study and analyze vampire attacks and their effects on WSN. We also study cryptographic techniques using solutions for these types of attacks. This document explores the investigation of vampire attacks and their solution is provided in combination with the Minimum Spanning Encryption (MST) and RC5 techniques.
Keywords: WSN Attacks; PLGP; Wireless Sensor Networks (WSN); MST; RC5.
Scope of the Article: Energy Harvesting and Transfer for Wireless Sensor Networks.