IRJET- A Secure Scheme for Detecting Provenance Forgery and Pocket Drop Attacks in Wireless Sensor

Page 6

International Research Journal of Engineering and Technology (IRJET) Volume: 05 Issue: 07 | July-2018

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

that backings identification of bundle misfortune assaults. Trial and systematic assessment comes about demonstrate that the proposed conspire is viable, lightweight and adaptable. In future work, I intend to execute a genuine framework model of our protected provenance conspire, and to enhance the precision of bundle misfortune location, particularly on account of different back to back noxious sensor hubs. REFERENCES [1] Villas L.A, Boukerche A, Ramos H.S, De and Loureiro A.A.F (2013)“DRINA:A Lightweight Aggregation in Wireless Sensor Networks,” IEEETrans.,on computers, vol.62 No.4, pp 676-689.,2013. [2] Al-Karaki J, Ul-Mustafa R, and Kamal A , “Data Aggregation in Wireless Sensor Networks —Exact and Approximate Algorithms,”Proc. High Performance Switching and Routing Workshop (HPSR ’04),pp. 241245,2004. [3] Akyildiz I.F, Su W, Sankarasubramaniam Y, and Cyirci E, “Wireless Sensor Networks: A Survey,” Computer Networks, vol.38, no. 4, pp. 393-422,2002. [4] Anastasi G, Conti M, Francesco M, and Passarella A , “Energy Conservation in Wireless Sensor Networks: A Survey,” Ad Hoc Networks, vol.7,no. 3, pp. 537568,2009. [5] Chandrakasan A.P, Smith A.C, and Heinzelman W.B , “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,”IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670,2002.

© 2018, IRJET

|

Impact Factor value: 7.211

|

ISO 9001:2008 Certified Journal

|

Page 148


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.