ABSTRACT
Objectives: To implement misdirection attack and analyze network performance of LEACH protocol; to propose node localization based technique to detect and isolate misdirection attack; to implement existing and the proposed techniques and compare the consequences in terms of throughput, delay and energy consumption.
Method: In this manner, a novel procedure has been proposed for the detection and isolation of the misdirection assault in Wireless Sensor Networks. The proposed technique is based on node localization, in which delay per hop is counted and the node which is increasing delay maximum times which can be detected as a malicious node.
Findings: The simulation of the planned algorithm is performed in NS2 by taking area of 800*800 meters and the numbers of nodes are 20. It has been analyzed that network throughput is to raise and the delay and energy utilization of the sensor nodes lessened.
1. Introduction
Wireless Sensor Network (WSN) consists of light weightremote sensors with components. These sensor nodes aregenerally cheaper in worth, with restricted energy storageand restricted process capabilities. Wireless Sensor Networkconsists of an oversized range of these sensor nodes (usuallyhundred or thousand of nodes). These sorts of networkare to a great degree appropriated and sent in an unfriendlysituations1. At that point gathered information is sent to thesink and sink sends information to the client through a web.Figure 1 indicated data flows from sensor node V to node Sthrough node M and a node N to sink or destination2.
7. Conclusion
Due to self-configuring nature of sensor networks some malicious nodes may join the network which is responsible for triggering various types of active and passive attack. The misdirection attack is the active type of assault, which will increase the delay in the network. In this work, a technique has been proposed which can detect and isolate malicious nodes from the network which is responsible for triggering misdirection attack. The proposed technique is based on node localization in this method base station will analyze the delay per hop. The node which can increase delay maximum times will be detected as malevolent nodes in the network. It is analyzed that the energy consumption of the network gets reduced, throughput gets increased and delay gets reduced in the network. Towards the end performance parameters are assessed on the premise of delay, throughput, and energy.