期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:7
出版社:S.S. Mishra
摘要:There are primarily two common attacks that interrupt the communication in wireless sensor networks, they are packet dropping and packet updating. To conquer these attacks many schemes are proposed, but only some are working capably to recognize the intruders that dropping packets but not the updaters. Criterion authentication mechanisms can't prevent this attack if the opponent has compromised one or small number of sensor nodes. For recognize updaters, we proposed an interleaved path-by-path AS that assures that the base station will recognize any fake insertion data packets when no excess of t nodes are compromised. Using AS at every node, Can recognize which packet is carrying Fake data. This scheme enables the base station to verify the authenticity of a report that it has received as long as the number of compromised sensor nodes does not go beyond a certain threshold. The scheme will filter out Fake data packets inserted into the network by compromised nodes before they arrive at the base station. So that we can stop the Fake data packets by using this scheme and can faintly modify the packets.