{"title":"基于IEEE 802.15.4无线传感器网络中恶意节点的性能分析","authors":"Krishan Kant Varshney, P. Samundiswary","doi":"10.1109/ICICES.2014.7033873","DOIUrl":null,"url":null,"abstract":"Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network\",\"authors\":\"Krishan Kant Varshney, P. Samundiswary\",\"doi\":\"10.1109/ICICES.2014.7033873\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.\",\"PeriodicalId\":13713,\"journal\":{\"name\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"volume\":\"23 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2014.7033873\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Communication and Embedded Systems (ICICES2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2014.7033873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network
Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.