Analysis of packets abnormalities in wireless sensor network

Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. However, its security becomes an...

Full description

Saved in:
Bibliographic Details
Main Authors: A.H., Azni, A., Azman, M.M., Saudi, A.H., Fauzi, D.N.F., Awang Iskandar
Format: Conference Paper
Language:en_US
Published: 2015
Subjects:
WSN
Online Access:http://ddms.usim.edu.my/handle/123456789/9044
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Sains Islam Malaysia
Language: en_US
id my.usim-9044
record_format dspace
spelling my.usim-90442015-08-12T07:02:56Z Analysis of packets abnormalities in wireless sensor network A.H., Azni, A., Azman, M.M., Saudi, A.H., Fauzi, D.N.F., Awang Iskandar, AODV Packet abnormalities Security threats WSN Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. However, its security becomes an issue because in WSNs, there is virtual communication by passing the data through sensor via internet. Caused of its limited capability, an intruder can attack the communication easier. Furthermore, routing in wireless sensor networks has, to some extent, been reasonably well studied. However, most current research has focused primarily on providing the most energy efficient routing. There is a great need for both secure and energy efficient routing protocols in WSN. Therefore, this project studies about the packets in WSN. To achieve the objectives, this project used AODV routing protocol to analyze the packets abnormalities in WSNs by using simulation technique. To show the differentiations of packets behaviors, the simulations have been conducted on AODV routing protocol under malicious node and without malicious node. It also conducts an analysis of packets behavior on flooding attack. © 2009 IEEE. 2015-08-12T07:02:56Z 2015-08-12T07:02:56Z 2010 Conference Paper 9780-7695-3938-6 http://ddms.usim.edu.my/handle/123456789/9044 en_US
institution Universiti Sains Islam Malaysia
building USIM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universit Sains Islam i Malaysia
content_source USIM Institutional Repository
url_provider http://ddms.usim.edu.my/
language en_US
topic AODV
Packet abnormalities
Security threats
WSN
spellingShingle AODV
Packet abnormalities
Security threats
WSN
A.H., Azni,
A., Azman,
M.M., Saudi,
A.H., Fauzi,
D.N.F., Awang Iskandar,
Analysis of packets abnormalities in wireless sensor network
description Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. However, its security becomes an issue because in WSNs, there is virtual communication by passing the data through sensor via internet. Caused of its limited capability, an intruder can attack the communication easier. Furthermore, routing in wireless sensor networks has, to some extent, been reasonably well studied. However, most current research has focused primarily on providing the most energy efficient routing. There is a great need for both secure and energy efficient routing protocols in WSN. Therefore, this project studies about the packets in WSN. To achieve the objectives, this project used AODV routing protocol to analyze the packets abnormalities in WSNs by using simulation technique. To show the differentiations of packets behaviors, the simulations have been conducted on AODV routing protocol under malicious node and without malicious node. It also conducts an analysis of packets behavior on flooding attack. © 2009 IEEE.
format Conference Paper
author A.H., Azni,
A., Azman,
M.M., Saudi,
A.H., Fauzi,
D.N.F., Awang Iskandar,
author_facet A.H., Azni,
A., Azman,
M.M., Saudi,
A.H., Fauzi,
D.N.F., Awang Iskandar,
author_sort A.H., Azni,
title Analysis of packets abnormalities in wireless sensor network
title_short Analysis of packets abnormalities in wireless sensor network
title_full Analysis of packets abnormalities in wireless sensor network
title_fullStr Analysis of packets abnormalities in wireless sensor network
title_full_unstemmed Analysis of packets abnormalities in wireless sensor network
title_sort analysis of packets abnormalities in wireless sensor network
publishDate 2015
url http://ddms.usim.edu.my/handle/123456789/9044
_version_ 1645152526402584576