Alekha Kumar Mishra

Learn More
Wireless sensor networks (WSN) are susceptible to various kinds of attack, and node replication attack is one of them. It is considered to be one of the most serious attacks in WSN. In this type of attack, an adversary deploys clones of a legitimate node. These clones participate in all network activities and behave identically same as the legitimate node.(More)
Major Wireless Sensor Network designs are focused on improving the network lifetime. The data aggregation process is the simplest way to achieve this. The PEGASIS routing protocol is a promising approach for efficient data aggregation in Wireless Sensor Networks. It is also reported in the literature that the PEGASIS performs better than LEACH and HEED(More)
MANET(mobile ad-hoc networks) is a type of network in which mobile nodes communicate to each other via radio waves. MANET is self configuring, infrastructure-less and robust network that's why nowadays its routing protocols become active research area. In this paper , literature survey of on-demand AODV and DSR routing protocols is to be discussed with(More)
Node replication attack possess a higher level of threat in wireless sensor networks. A replicated node takes advantage of having legal identity of the compromised node to control the network traffic and inject malicious information into the network. Several techniques have been proposed to detect node replication in wireless sensor networks. However, in(More)
Data aggregation is a promising way to reduce the redundant data communication in wireless sensor networks and hence improves the network lifetime. Among the various data aggregation protocols, it is reported that PEGASIS is better than LEACH and HEED. PEGASIS is a chain based aggregation protocol, where each node communicates only with its closest(More)
  • 1