Node Validation Technique to Increase Security of Wireless Sensor Networks
Parveen Singla1, Gaurav Mehta2, Rinkesh Mittal3, Vinay Bhatia4

1Dr. Parveen Singla, Department of Electronics & Communication Engineering, Chandigarh Engineering College, Landran (Punjab), India.

2Gaurav Mehta, Department of Electronics & Communication Engineering, Chandigarh Engineering College, Landran (Punjab), India.

3Dr. Rinkesh Mittal, Department of Electronics & Communication Engineering, Chandigarh Engineering College, Landran (Punjab), India.

4Dr. Vinay Bhatia, Department of Electronics & Communication Engineering, Chandigarh Engineering College, Landran (Punjab), India.

Manuscript received on 05 August 2019 | Revised Manuscript received on 12 August 2019 | Manuscript Published on 26 August 2019 | PP: 863-867 | Volume-8 Issue-9S August 2019 | Retrieval Number: I11380789S19/19©BEIESP | DOI: 10.35940/ijitee.I1138.0789S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A distributed sort of network in which sensor nodes can join or leave the network when they want is identified as wireless sensor network. Due to self-arranging of the network, attacker nodes make their entry inside networks and launch different types of active and passive intrusions. The active attacks can be divided into various sub categories and one of them is misdirection attack. This attack increases delay in the network. The available attacker hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is proposed in this work. The malicious nodes are recognized from the networks which are in charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion. This intrusion streams fake recognition information within the network. This study proposes a verification approach for detecting attacker nodes present in the network. The performance of introduced approach is tested in NS2. It is scrutinized that performance is improved as per various parameters.

Keywords: Active Attacks, Dos, Ids, Leach, Ns2, Sinkhole, Wsn
Scope of the Article: Adhoc and Sensor Networks