Authors: P.P. Joby; P. Sengottuvelan
Addresses: Department of IT, PPG Institute of Technology, Coimbatore, India ' Department of IT, Bannari Amman Institute of Technology, Sathyamangalam, India
Abstract: Wireless sensor networks (WSN) is an embryonic communication technique in the universe to be engaged for precarious circumstances resembling battle arenas and viable applications such as construction, transportation surveillance, territory monitoring, clever homes etc. Currently, a wireless sensor network facing a foremost problem is the result from security issues. There are many security methodologies available for a wireless sensor network. Generally classified as two levels; one is low level, further categorised into privacy, key establishment, trusted network, secrecy, authentication, secure routing etc. The second one is high level, further categorised into secure group management, intrusion detection, data integrity etc. This research focusing on the network availability, prior revisions offered to protect the network beside denial of service attacks with the use of traffic monitoring proxies on some nodes. But if the governor nodes are miserable, then it is vulnerable to the network. To overcome this, the research puts forth a mechanism called election method to elect the control nodes in a cluster. To simulate this methodology, packet tracer tool is used.
Keywords: wireless sensor networks; WSNs; election method; network security; control proxies; simulation; localised clustering; attack detection; DoS attacks; network availability; packet tracing; denial of service attacks; traffic monitoring.
International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.3, pp.211 - 222
Received: 31 Jul 2014
Accepted: 16 Oct 2014
Published online: 04 Jul 2015 *