A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Author(s):
Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Keywords:
Abstract
Now a day rapid advances in processor, memory, and frequency technology is development of large distributed networks of less, cheap nodes that are capable of sensing, computation, and wireless communication. The basic operation in such a network is the efficient gathering and transmission of sensed data to a base station for advance processing. The life of such a sensor system is the time during which we can gather information from all the sensors to the base station. A fundamental challenge in data gathering is to maximize the system lifetime, given the energy constraints. As sensor networks are being all the time more deployed in decision-making. We introduce efficient tools for provenance verification method and reconstruction method at the base station with the functionality to detection packet drop attacks or by malicious data forwarding nodes. In our paper, we propose a novel lightweight scheme to securely transmit provenance for network. We introduce efficient tools for provenance verification and reconstruction at the base station. In addition the secure provenance scheme with the functionality to detection packet drop attacks by malicious data from the source to destination node.
Article Details
Unique Paper ID: 143543

Publication Volume & Issue: Volume 2, Issue 12

Page(s): 307 - 310
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews