Contact at or 8097636691/9323040215
Responsive Ads Here

Thursday, 14 June 2018



 As of date, wireless sensor systems (WSNs) have gotten much consideration as methods for gathering and using information from the real world. The quantity of WSN applications is being expanded broadly and the application range is required to spread. WSN is a system made out of a substantial number of sensor hubs with restricted radio capacities and one or few sinks that gather information from sensor nodes. Remaining nodes are the vindictive nodes in WSN which corrupts the execution of the WSN. The unwanted node recognition is a perplexing issue in WSN because of its comparative qualities with different nodes in WSN. In this paper, different systems for the identification and relief of malicious nodes in remote sensor network environment are examined.


 Wireless Sensor Network (WSN) is a collection of spatially distributed sensor nodes in the large space environment. The main application of deploying WSN are military and environmental monitoring as T-sunami alert and Earth Quake in various regions of the earth. The sensor node contains an inbuilt sensing element which is used to sense the surrounding information and this information may be either analog or digital depends on the environment. This sensed information is converted into digital form information using analog to digital converter. This converted digital information is sent to a processor unit which performs some mathematical manipulations on the sensed data which is suitable for data transmission and reception through the antenna element to the remote area. The main contribution of this sensor node is to collect and propagate the data to the remote unit in a wireless manner. The transmitted data may be passed through some medium which affects the performance of the data transmission in the form of noises and some environmental fluctuations. Hence, the received data in the receiver section is affected by noise. These noise contents are suppressed in the receiver side and then the data from the transmitted packets are recovered.

The performance of the sensor node is affected in another way by attackers. The attacker attacks the sensor either in the direct or indirect way. Indirect way, the attacker from outside environment affects the data transmission and reception on sensor node such as Distributed Denial of Service (DDOS) attack. In indirect attack mode, the behavior of the sensor node is controlled by an attacker through the nearby nodes. The attacker may be active or passive. In active mode, the data transmission is altered by an attacker. In case of passive attack, the attacker can able to capture the data transmission only. They are not able to alter any data passage.