The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives:To avoid node become compromised and achieve secure data aggregationwith energy efficiency in the Wireless Sensor Network(WSN)by using Honeypot system. Methods/ Statistical Analysis: Honeypot system is a fake node plays vital role in the sensor network that attract the attackers, find attackers ID, analysis type of attacks and energy consumption by the attacks subsequently alert Base Station without disturbing the sensor network. Base Station can easily identify intruder or attacker using Honeypot and alert all sensor nodes. So each node able to identify the attackers before the actual attack. Findings:When node become compromised, itleads problem in data aggregation.Honeypot avoids compromised node and achieves good level of energy efficiency, life span, throughput ratio and success rate. Also it degrades the vulnerablility of attacks. Application/Improvement:Honeypot system makes deception and deterrence to the attackers. Its used for early warning, to detect attackers and type of attacks, it enhances the intrusion detection systems and helps in designing better tools for security.

Keywords

Attackers, Compromised Node, Data Aggregation, Energy Efficiency,Honeypot, Type of Attack.
User