Documente Academic
Documente Profesional
Documente Cultură
Abstract--- The exponential growth of connected autonomous powered which are shielded with a limited energy resource
embedded devices will pose huge challenges with regard to [2] and is one of the exigent demands when it comes to
devices and inter device communication security. Features like network design consideration. Prolonging the lifetime of
encrypted communication, device authentication and device sensor networks is quite challenging which requires careful
authorisation must be appropriately addressed in order to
selection of sensor nodes to perform a given task. Recently
provide a reliable and penetration-resistant device network.
In recent years, applications of WSN have been increased due there has been an extensive on going research in the field
to its vast potential to connect the physical world to the virtual of reliable routing protocols to provide secure routing and
world. It becomes a trend to deploy the large number of increase the network lifetime. The reliable routing, network
portable wireless sensors in wireless sensor networks to latency, secure data aggregation and network scalability are
increase the QOS. AODV is an effective method for clustering the important issues in wireless sensor networks.
in a homogeneous WSN .Removing the malicious node
increases the energy efficiency and security in wireless sensor II. RELATED WORKS
network.
Internet of Things (IOT) devices is rapidly becoming
KeywordsWSN (Wireless Sensor Network), QOS (Quality Of
Service), AODV (Ad hoc On- demand Distance Vector),IOT
important while IOT services are becoming pervasive. A
(Internet Of Things). thread is an action that takes advantage of security
weaknesses in a system and has a negative impact on it. In
I. INTRODUCTION this paper security challenges and security threats to IOT
were introduced[1]. Public key infrastructures (PKI) and
Internet of things (IOT) is the inter-connecting of digital certificates are important of todays secure Internet
physical devices, vehicles, buildings and other items with infrastructure. In this analyses the benefits, limitations and
electronics, software, sensors, actuators and network suitability of both concepts for IOT combination with
connectivity that enables to collect and exchange the data. secure communication protocols [2]. The Internet of Things
In this wireless sensor network they are achieving (IOT) aspect of smart home from a security identity, and
significance important in the information and adapt an advanced malware technique for the IOT. We
communication technologies with the development of design several attacks including cyber physical system
internet of things. However security is considered as attacks and advanced cyber-attacks, and then evaluate their
important challenge in internet of things. In the wireless impact in practical evaluations [3].WSNs are achieving
sensor network (WSN) there will be presence of more significance importance in the information and
number of cluster. Cluster which is used for sharing the communication technologies with the development of
information between the different nodes. There will be the Internet-of-Things (IOT). WSNs are connected with the
presence of cluster header in each WSN. From that it also Internet in many industrial applications. Optimized location
has the malicious node which is act as false node. Wireless of cluster heads (CHs) for energy efficiency in a different
Sensor Networks are known for their fault tolerance and WSN (that consists of few energy harvesting sensors and
good sensing coverage. Recently, Wireless Sensor mostly non-renewable sensors) is used [4]. In order to
Networks are tremendously being used in various increase the network delay and rectify the security induced
applications [1] like monitoring, detection, process control, by the malicious nodes in Wireless Sensor Networks, the
data gathering and many more. In spite of all these leads, residual energy and reliability values are used to form a
WSNs are highly susceptible to security ultimatum, energy secured clustering. The simulated experimental results in
constraints and impingement by malicious nodes. The NS2 platform show that the proposed method can reduce
camouflaged malicious nodes in the sensor networks can the effect of malicious nodes and improve the network
seriously distort the normal functioning of wireless sensor lifetime for the sensor network. Wireless Sensor Networks
networks. Once the malicious nodes launch the attack, the are known for their fault clearance and good sensing
incursions are hard to identify. Sensory nodes are battery coverage.
III. PROPOSED TECHNIQUE When the source node receives the RERR packet
then it restarts the route or stops sending data.
Increased automation and digitization creates new
security concerns. Finding the cluster header and malicious
node can increases the data transmission between the
sources and destination. Security challenges, such as
privacy and entity trust were identified. Proposed
approaches are based on reducing energy consumption and
improving the lifetime of the network.
// if malicious node
If (malicious == true ) {
drop (p, DROP_RTR_ROUTE_LOOP);
// DROP_RTR_ROUTE_LOOP is added for no
reason.
TABLE-1
PARAMETER USED IN SIMULATION
Number of nodes 6
V. RESULT ANALYSIS