A DETAILED SURVEY ON MALICIOUS NODE DETECTION AND MITIGATION IN LARGE SCENARIO WIRELESS NETWORKS
Authors/Creators
Description
As of date, wireless sensor systems (WSNs) have gotten much consideration as methods for gathering and using information from the real world. The quantity of WSN applications is being expanding broadly and the application range is required to spread. WSN is a system made out of a substantial number of sensor hubs with restricted radio capacities and one or few sinks that gather information from sensor nodes. Remaining nodes are the vindictive nodes in WSN which corrupts the execution of the WSN. The unwanted node recognition is a perplexing issue in WSN because of its comparative qualities with different nodes in WSN. In this paper, different systems for the identification and relief of malicious nodes in remote sensor network environment are examined.
Files
Files
(248.4 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:3ac0b2806afe5c696798a6029631e120
|
248.4 kB | Download |