• Corpus ID: 212473298

SECURE AND ENERGY EFFICIENT PROTOCOL USING BFO & FUZZY LOGIC IN WSN

@inproceedings{Dahiya2015SECUREAE,
  title={SECURE AND ENERGY EFFICIENT PROTOCOL USING BFO \& FUZZY LOGIC IN WSN},
  author={Renu Dahiya and Navneet Verma},
  year={2015}
}
Geeta Engineering College Naultha, Panipat, Haryana (132103), India renudahiya23@gmail.com 2 Geeta Engineering College Naultha, Panipat, Haryana (132103), India navneet.cse@geeta.edu.in Abstract: A Wireless sensor network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a… 

References

SHOWING 1-10 OF 25 REFERENCES
BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN
TLDR
This paper proposes an efficient technique that uses multiple base stations to be deployed randomly in the network to counter the impact of black holes on data transmission and can be used to identify 100% black hole nodes with almost negligible false positives.
Detection of Black Hole Attack In MANET Using FBC Technique
TLDR
A technique which uses the fuzzy based control, to detect and mitigate type of attack, namely malicious packet dropping, in wireless ad-hoc network, which shows that in a dynamically changing network, this technique can detect most of the malicious nodes with a relatively high positive rate.
Optimized Positioning Of Multiple Base Station for Black Hole Attack
TLDR
This paper has proposed the algorithm that will help to successfully deliver the packets in the presence of black hole attack by using multiple base stations with optimized position using genetic algorithm (GA).
Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET
TLDR
This paper represents an intrusion detection system for MANETs against blackhole attack using fuzzy logic and shows that the proposed system not only detects the blackhole node, but improves the performance of AODV under the black hole attack.
A Fuzzy Based Approach to Detect Black hole Attack
TLDR
A fuzzy based decision to check a node is infected by Black hole attack or node is presented and the proposed system will identify the attack over the node as well as provide the solution to reduce the data loss over the network.
Detection and Prevention of Blackhole Attack in MANET Using ACO
TLDR
There is a need to build a multifence security solution that achieves both broad protection and desirable network performance in MANETs to overcome the challenges.
Effect of Varying Initial Energy on Multihop Routing Protocol in Wireless Sensor Network
TLDR
Impact of changing the initial energy parameter on the proposed multihop routing protocol as well as Assisted LEACH is analyzed so that its exact effect could be understood and interpreted in terms of performance parameters like throughput, average energy consumption so that reasons for packet drops, routing overheadscould be understood in relation to routing of data packets over the network.
Secure and Reliable Data Transmission in Wireless Sensor Network: A Survey
Wireless sensor network increases its application in industrial field as well as in consumer application very rapidly. Its growth increases day by day. Sensor node normally senses the physical event
Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges
TLDR
A comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks, and highlights the primary motivation behind the development of each protocol category and explains the operation of different protocols in detail, with emphasis on their advantages and disadvantages.
...
...