A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK

  • Unique Paper ID: 143543
  • Volume: 2
  • Issue: 12
  • PageNo: 307-310
  • Abstract:
  • Now a day rapid advances in processor, memory, and frequency technology is development of large distributed networks of less, cheap nodes that are capable of sensing, computation, and wireless communication. The basic operation in such a network is the efficient gathering and transmission of sensed data to a base station for advance processing. The life of such a sensor system is the time during which we can gather information from all the sensors to the base station. A fundamental challenge in data gathering is to maximize the system lifetime, given the energy constraints. As sensor networks are being all the time more deployed in decision-making. We introduce efficient tools for provenance verification method and reconstruction method at the base station with the functionality to detection packet drop attacks or by malicious data forwarding nodes. In our paper, we propose a novel lightweight scheme to securely transmit provenance for network. We introduce efficient tools for provenance verification and reconstruction at the base station. In addition the secure provenance scheme with the functionality to detection packet drop attacks by malicious data from the source to destination node.
email to a friend

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 12
  • PageNo: 307-310

A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK

Related Articles