Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Intrusion Forbearance Routing for a Wireless Sensor Network Using Dismissal Supervision of Multipath Routing (IFROST)


Affiliations
1 Shri Angalamman College of Engineering and Technology, Trichy, India
2 Department of Information Technology, St. Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, India
     

   Subscribe/Renew Journal


In the multipath routing, there occurs a number of intermediate nodes between source and destination. Each node will maintain information about another node and during any need of information the voting algorithm is used and each node vote about the other node. So during voting there may occur a chance of misjudging of good node as bad node and bad node as good node. This is bad mouthing attack which may lead to loss of packet transmission in wireless network. An algorithm called weighted voting is used to overcome this problem. Trust metrics is calculated based on direct trust and indirect trust. Using the trust metrics value the node is selected and the main aim is to identify the intruder and to provide solution for bad mouthing attack.


Keywords

Network Security, Wireless Sensor Network, Bad Mouthing Attack, Reliability, Weighted Voting.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 239

PDF Views: 3




  • Intrusion Forbearance Routing for a Wireless Sensor Network Using Dismissal Supervision of Multipath Routing (IFROST)

Abstract Views: 239  |  PDF Views: 3

Authors

A. Ancey Sneha
Shri Angalamman College of Engineering and Technology, Trichy, India
A. Antony Prakash
Department of Information Technology, St. Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, India

Abstract


In the multipath routing, there occurs a number of intermediate nodes between source and destination. Each node will maintain information about another node and during any need of information the voting algorithm is used and each node vote about the other node. So during voting there may occur a chance of misjudging of good node as bad node and bad node as good node. This is bad mouthing attack which may lead to loss of packet transmission in wireless network. An algorithm called weighted voting is used to overcome this problem. Trust metrics is calculated based on direct trust and indirect trust. Using the trust metrics value the node is selected and the main aim is to identify the intruder and to provide solution for bad mouthing attack.


Keywords


Network Security, Wireless Sensor Network, Bad Mouthing Attack, Reliability, Weighted Voting.