Beruflich Dokumente
Kultur Dokumente
A. Muruganandam1, R. Anitha2
1
I.
INTRODUCTION
1185
3) Data Aggregation
Some sensor network protocols aggregate the
reading of sensors in order to conserve energy
ratherthan returning individual readings. By Sybil
attack,one malicious node may be able to alter the
reading.
4) Voting
In Wireless Sensor Network, most of the
decisions are made by voting. Since the Sybil node
has many identities, a single node has a chance of
voting many times, thus destructing the process.
2) Routing
In multipath or disparity routing in, seemingly
disjoint paths could in fact go through a single
malicious node presenting Sybil identities.
Figure 5. Fair Resource Allocation
6) Misbehavior Detection
Sybil nodes can be used to spread the blame in a
misbehavior detection network.
C. Problem Statement
Figure 2. Routing
1186
1187
Source
1
Source 2
Source
3
3
1
Base
Station
K. Sybil Attack
The attacker uses different identities at the same
time. A single attacker could pretend nodes to report
the existence of a false bottleneck in traffic.
MANETs are mainly related to illegally gathering
sensitive information about mobile nodes. To relate
between a source and its destination, affect on data
during transmission time in network.
Data
Transmissio
n
Data
Transferred
Attackers
Key Gen
Destination
different
1188
Parameter
Channel/WirelessChannel
TwoRayGround
Phy/WirelessPhy
Mac/802_11
Queue/DropTail/PriQueue
LL
Antenna/OmniAntenna
50
71
AODV
1200
1200
10.0
O. Simulation Result
Description
channel type
radio-propagation model
network interface type
MAC type
interface queue type
link layer type
antenna model
max packet in ifq
number of mobilenodes
routing protocol
X
dimension
of
topography
Y
dimension
of
topography
time of simulation end
[1]
1189
AUTHORSPROFILES
Mr. A. MURUGANANDAM, is an
Assistant Professor cum Head,
Department of Computer Science,
Don Bosco College, Dharmapuri,
Tamilnadu, India. He is a
Research Scholar in the field of
Wireless Sensor Networks at Bharathiyar University,
Coimbatore, Tamilnadu, (India).Hisresearch is
focused on Data hiding method for preventive and
selective jamming attacks in Wireless Sensor
Network
Dr. R. ANITHA is currently
working as Professor & Director
in the Department of Master of
Computer
Applications,
uthayammal
Engineering
College, Rasipuram, Tamilnadu,
India. She has aobtained her
MCA Degree from Bharathidasan University,
Tiruchirappalli, and Ph.D. from Periyar University,
Salem. She has vast experience in teaching as well as
research. She has presented papers at several
1190