Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5280
Title: Comparative Analysis of WSN MAC Protocols and Node Clone Attack
Authors: Mishra, Balmukund
Singh, Yashwant [Guided by]
Keywords: Wireless sensor networks
MAC protocols
Node clone detection
WSNs
Issue Date: 2015
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Wireless Sensor Networks (WSN) are practiced in many real life applications such as military, weather forecasting, medical, target spotting and tracking, etc. The sensor nodes are spread over the target area for the accumulation of data. The collected data further transmitted from one sensor node to other sensor node. WSN nodes have limited resources like energy, memory and processing capabilities. Efficient utilization of these resources is challenging task in WSN. MAC layer of wireless sensor nodes plays a vital role in WSN because most of the power is depleted at this layer due to collision in medium access and node synchronization. We have given a comparative analysis of all the existing WSN MAC protocol. The comparison is done on the basis of various parameters such as energy consumption, end to end latency, scalability, security from the outside attacker. Analysis of these MAC protocols will serve us in selection of a MAC protocol for a particular WSN application. As well as second part of my project is node clone detection. Node clone in wireless sensor network is very dangerous issue because nodes are deployed in hostile environment where it is not possible to physically go and protect the system and node. So nodes deployed in hostile environment can easily captured and compromised by intruders and all the confidential and personal data been extracted from node. However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. In this project work we will give a novel approach for node clone detection that will takes very less communication messages for detection of node clone and revocation.
URI: http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5280
Appears in Collections:Dissertations (M.Tech.)

Files in This Item:
File Description SizeFormat 
Comparative Analysis of WSN MAC Protocols and Node Clone Attack.pdf971.86 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.