A Survey Paper On Network Attack Detection Using Various Security Techniques

  • M.MOHAMMMEDNIZAR, Dr.T.VELUMANI
Keywords: Wireless Sensor Network (WSN), Sinkhole attack, security, authentication,Attack recognition, data transmission, Secure TEEN protocol.

Abstract

Wireless Sensor Network (WSN) is up-and-coming as a capable raised area for diverse areas in military and civilian fields. The sensor network contains infinite tiny sensor nodes with restrictedpossessions with a base station and little rate, less control sensor nodes which are employed forsupervisingprinciples. Since these sensor nodes are little sized and great in amount so these networks are simply apt tothreat. There areseveralpotentialthreats on sensor network such as sinkhole, black-hole, Denial of Service attacks, jamming. Sinkhole threat is one of the morecriticaldirecting threat. Present techniques are not assured enhanced protection and verificationopposing totalthreats in WSN. In order to resolve the problems present techniques are analyzed various techniques of security and authentication methods. In this work, energy efficiency methods, Cluster Head (CH) node selection and attack detection using security methods are performed to improve the secure data transmission process significantly. This survey is also analyzed the advantages and shortcomings of each method applied to WSN. The comparative analysis is done using various security techniques like watermarking method, Hop Count Technique (HCT), Elliptic Curve Cryptography (ECC), homomorphism and Secure Threshold sensitive Energy Efficient sensor Network (TEEN) protocol.Experimentaloutcomes indicate thatSecure TEENapproach provides better performance with regard to lower end to end delay, energy usage and higher throughput, packet delivery ratio and network lifetimerather than the other existing methods

Published
2021-09-04
How to Cite
M.MOHAMMMEDNIZAR, Dr.T.VELUMANI. (2021). A Survey Paper On Network Attack Detection Using Various Security Techniques. Design Engineering, 5808-5825. Retrieved from http://thedesignengineering.com/index.php/DE/article/view/4016
Section
Articles