فهرس المقالات Swathi B H


  • المقاله

    1 - IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
    Journal of Advances in Computer Engineering and Technology , العدد 2 , السنة 4 , بهار 2018
    Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common a أکثر
    Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value. تفاصيل المقالة

  • المقاله

    2 - Routing Hole Handling Techniques for Wireless Sensor Networks: A Review
    Journal of Advances in Computer Engineering and Technology , العدد 2 , السنة 6 , بهار 2020
    A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of أکثر
    A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensing and communication functionalities of the network. Many kinds of holes can be formed in a sensor network that creates geographically correlated areas. These holes are also responsible for creating communication voids. These voids do not let the packets to reach the destination and minimises the expected network performance. Hence it ought to be resolved. In this paper we presented different kinds of holes that infect the sensor network, their characteristics and the effects on successful communication within the sensor network .Later we presented a detailed review on different routing hole handing techniques available in literature ,their possible strengths and short comes. At last we also presented a qualitative comparison of these routing hole handing techniques. تفاصيل المقالة