Sequestration Security in A Remote Sensor Network

1Niketha Anand, Sibi Amaran and R.S. Preyanka Lakshme

140 Views
49 Downloads
Abstract:

The implementation of identifying a malicious node in a system and then removing the malicious nodes detected to prevent errors that might occur due to them. An effective Security Program is one that does not have any malicious nodes. Few techniques and as viruses, spyware, and trojan horse. Message authentication and checksum are involved in the implementation of identifying malicious nodes. The tools used are Network Simulator 2, Cryptography, GSTEB algorithm. Network Simulator is an open-source designed specifically for research in computer communication networks. The proposed work can solve Sequestration Security in a network and detect any intruder detections on a cluster of data in a network, it not only detects attacks but also handles them.

Keywords:

Wireless Sensor Network, Network Simulator 2, GSTEB Algorithm, LEACH Algorithm, Source Node, Base Station, Clusters

Paper Details
Month4
Year2020
Volume24
IssueIssue 5
Pages2288-2299