Detection Techniques for Selective Forwarding Attack in Wireless Sensor Networks
Surinder Singh1, Hardeep Singh Saini2
1Surinder Singh, Research Scholar, IKG PTU, Kapurthala (Punjab), India.
2Hardeep Singh Saini, Professor, Indo Global College of Engineering, Abhipur (Punjab), India.
Manuscript received on 23 March 2019 | Revised Manuscript received on 04 April 2019 | Manuscript Published on 18 April 2019 | PP: 380-383 | Volume-7 Issue-6S March 2019 | Retrieval Number: F02750376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A Wireless Sensor Network (WSN) consist of sensing area, base station, internet and user which can measure and predict temperature, sound, wave, vibration, pressure etc. As the transmission of data is involved in WSN and Transmission Control Protocol/Internet Protocol (TCP/IP) is used for sending the data to the base station. The security of transmitting the data is crucial as the data contain precious information. The attacker can attack any layer of TCP/IP protocol. The network layer may prone to selective packet dropping attack, Sybil attack, Wormhole attack, Black-hole attack and Denial of Service (DOS) attack. These kinds of attacks can be overcome by using key management process. The communications between the nodes are only possible through these keys. The security of data transmission can be increased by using key environment in wireless sensor network. The number of detection techniques based on Key management process is discussed in this paper. These techniques are Public Key Encryption (PKE), Rivest Shamir Adelmen (RSA), ELGAMAL and Chinese Reminder Theorem (CRT) based RSA. In this paper, detailed study for these techniques on the basis of storage space required, energy consumption and time consumption for key exchange parameters has been discussed.
Keywords: Attacker Node, Sensor Node, Wireless Sensor Network.
Scope of the Article: Wireless ad hoc & Sensor Networks