{"id":5691,"date":"2023-08-25T18:38:15","date_gmt":"2023-08-25T18:38:15","guid":{"rendered":"https:\/\/getmyprojects.in\/projects\/?post_type=product&#038;p=5691"},"modified":"2023-10-26T09:26:12","modified_gmt":"2023-10-26T03:56:12","slug":"sinkhole-attack-detection-in-wireless-sensor-networks-to-improve-service-quality","status":"publish","type":"product","link":"https:\/\/getmyprojects.in\/projects\/product\/sinkhole-attack-detection-in-wireless-sensor-networks-to-improve-service-quality\/","title":{"rendered":"Sinkhole Attack Detection in Wireless Sensor Networks to Improve Service Quality"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-size: 12pt; color: #000000;\">Wireless Sensor Network (WSN) has many low-cost, small sensor nodes capable of transmitting data. The wireless sensor nodes constraints are low communication range, low power supply, low memory, and low computational power. These constraints make this network vulnerable to many attacks, especially the sinkhole attack. Sinkhole attack is a kind of attack in which the compromised node attempts to attract network traffic by advertising its false routing update. One of the effects of a sinkhole attack is that it could launch selective sharing attacks, spoofing attacks and dropping or modified routing data.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 12pt; color: #000000;\">It could further use to transmit fake data to the base station. This paper proposed Time-varying Snapshot-based Neighbour-controlled Traffic-centric (TSNT) sinkhole attack detection algorithm in wireless sensor networks to improve service quality and deal with these problems. Using TSNT algorithm, the base station observes the traffic, and in every time frame, it maintains the list of sensor device the packet has travelled.<\/span><br \/>\n<span style=\"font-size: 12pt; color: #000000;\">From this list, the existence of sinkhole is discovered based on a snapshot of the WSN taken in various time frames. Simultaneously, a trusted third party available in the WSN network helps the base station detect sinkhole attack based on data integrity verification using message digest hash.<\/span><br \/>\n<span style=\"font-size: 12pt; color: #000000;\">The experimental result shows that the proposed method detects sinkhole efficiently compared with other existing algorithms.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<table style=\"width: 63.8846%; height: 192px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<th style=\"text-align: left; height: 24px; width: 37.9242%;\"><strong>Project Name<\/strong><\/th>\n<td style=\"height: 24px; width: 60.479%;\">Sinkhole Attack Detection in Wireless Sensor Networks to Improve Service Quality<\/td>\n<\/tr>\n<tr class=\"alt\" style=\"height: 24px;\">\n<th style=\"text-align: left; height: 24px; width: 37.9242%;\"><strong>Front End\u00a0<\/strong><\/th>\n<td style=\"height: 24px; width: 60.479%;\"><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<th style=\"text-align: left; height: 24px; width: 37.9242%;\"><strong>Back End<\/strong><\/th>\n<td style=\"height: 24px; width: 60.479%;\"><\/td>\n<\/tr>\n<tr class=\"alt\" style=\"height: 48px;\">\n<th style=\"text-align: left; height: 48px; width: 37.9242%;\"><strong>Software<\/strong><\/th>\n<td style=\"height: 48px; width: 60.479%;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":6106,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"product_cat":[29,28],"product_tag":[572,573,33,45,574,143,500,575],"_links":{"self":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5691"}],"collection":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/comments?post=5691"}],"version-history":[{"count":27,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5691\/revisions"}],"predecessor-version":[{"id":6356,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5691\/revisions\/6356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media\/6106"}],"wp:attachment":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media?parent=5691"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_cat?post=5691"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_tag?post=5691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}