• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 42, Pages: 1-4

Original Article

Proficient Techniques and Protocols for the Identification of Attacks in WSN: A Review

Abstract

Objectives: In WSN (Wireless Sensor Network) attacks are the central concern. In this paper, we discuss various authentication techniques and protocols for detection of attacks in WSN). Our scope be situated on the way to take new authentication technique by analyzing various techniques and protocols for detection of attack. This technique solves the problems in existing techniques like micro Timed Sufficient Streaming Loss Tolerant Authentication protocol (µ TESLA), Secured Network Encryption Protocol (SNEP), Long Term Equity Anticipation Security (LEAP) ad node authentication all these techniques require an extra amount of energy for computational cost is very high. Analysis: Wireless Sensor Network (WSN) is used in various applications to monitor the sensitive environment. These applications have a high impact in human pursuit, battlefield monitoring and surround watching. After the deployment of the sector nodes at respective places the manual maintenance and monitoring is minimum for long interval of time due to these conditions it creates security problems at sensitive areas wherever the appliance is deployed. In this environment anyone will comes within the network to modify and hack the data. Due to this reason interference of the network also suffers from several constraints like low computation capability and restricted energy. These constraints conjointly build a security as a challenge in Wireless Sensor Network. In this paper we have various security protocols and techniques to beat these problems. Findings: By the limitations of resource we analysis and find the Zero Knowledge Protocol with Interlock Protocol for Sybil attack detection in WSN. These techniques having a less bandwidth, small computational power and less memory space.

Keywords: Group Key Management, Long Term Equity Anticipation Security (LEAP), Micro Timed Sufficient Streaming Loss Tolerant Authentication Protocol (µ TESLA), Wireless Sensor Networks (WSN), Zero Knowledge Verification Protocol 

DON'T MISS OUT!

Subscribe now for latest articles and news.