Open Access Open Access  Restricted Access Subscription Access

Avert Compromised Node in Wireless Sensor Network with Honeypot System


Affiliations
1 Bharathiar University,Coimbatore - 641046, Tamil Nadu, India
2 Periyar University, PG Extn Centre, Dharmapuri, Salem - 636011, Tamil Nadu, India
 

Objectives:To avoid node become compromised and achieve secure data aggregationwith energy efficiency in the Wireless Sensor Network(WSN)by using Honeypot system. Methods/ Statistical Analysis: Honeypot system is a fake node plays vital role in the sensor network that attract the attackers, find attackers ID, analysis type of attacks and energy consumption by the attacks subsequently alert Base Station without disturbing the sensor network. Base Station can easily identify intruder or attacker using Honeypot and alert all sensor nodes. So each node able to identify the attackers before the actual attack. Findings:When node become compromised, itleads problem in data aggregation.Honeypot avoids compromised node and achieves good level of energy efficiency, life span, throughput ratio and success rate. Also it degrades the vulnerablility of attacks. Application/Improvement:Honeypot system makes deception and deterrence to the attackers. Its used for early warning, to detect attackers and type of attacks, it enhances the intrusion detection systems and helps in designing better tools for security.

Keywords

Attackers, Compromised Node, Data Aggregation, Energy Efficiency,Honeypot, Type of Attack.
User

Abstract Views: 138

PDF Views: 0




  • Avert Compromised Node in Wireless Sensor Network with Honeypot System

Abstract Views: 138  |  PDF Views: 0

Authors

N. Vidhya
Bharathiar University,Coimbatore - 641046, Tamil Nadu, India
P. Sengottuvelan
Periyar University, PG Extn Centre, Dharmapuri, Salem - 636011, Tamil Nadu, India

Abstract


Objectives:To avoid node become compromised and achieve secure data aggregationwith energy efficiency in the Wireless Sensor Network(WSN)by using Honeypot system. Methods/ Statistical Analysis: Honeypot system is a fake node plays vital role in the sensor network that attract the attackers, find attackers ID, analysis type of attacks and energy consumption by the attacks subsequently alert Base Station without disturbing the sensor network. Base Station can easily identify intruder or attacker using Honeypot and alert all sensor nodes. So each node able to identify the attackers before the actual attack. Findings:When node become compromised, itleads problem in data aggregation.Honeypot avoids compromised node and achieves good level of energy efficiency, life span, throughput ratio and success rate. Also it degrades the vulnerablility of attacks. Application/Improvement:Honeypot system makes deception and deterrence to the attackers. Its used for early warning, to detect attackers and type of attacks, it enhances the intrusion detection systems and helps in designing better tools for security.

Keywords


Attackers, Compromised Node, Data Aggregation, Energy Efficiency,Honeypot, Type of Attack.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i41%2F125392