Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/4371
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kaur, Navjyot | - |
dc.contributor.author | Kaur, Amandeep | - |
dc.contributor.author | Singh, Mandeep | - |
dc.contributor.author | Pushkarna, Gaurav | - |
dc.date.accessioned | 2019-12-26T04:58:35Z | - |
dc.date.available | 2019-12-26T04:58:35Z | - |
dc.date.issued | 2017-02-01 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/4371 | - |
dc.description.abstract | On-demand dynamic source routing protocol (DSR) is used to detect black hole nodes in the wireless sensor nodes. Various scenarios are simulated using NS2, which is a discrete event network simulator. In this paper, the events are processed in order of their scheduled occurrences and time. First and foremost, the deployment of sensor nodes is done in simulator. Then few nodes are assigned the role of malicious nodes. Finally, the communication among the multiple sensor nodes begins. The communication in network is made using DSR. When the communication ends, each log is maintained in the trace file. Using the trace file, the AWK files calculated several performance factors like the number of packets dropped, decreased throughput, variation in the packets sent and received. These parameters help in interpreting the behavior of malicious and potential suspicious nodes. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Far East Journal of Electronics and Communications | en_US |
dc.subject | Wireless Sensor Networks | en_US |
dc.subject | DSR Protocol | en_US |
dc.title | Detection of black hole node in wireless sensor networks using DSR protocol (Only Abstract) | en_US |
dc.type | Article | en_US |
Appears in Collections: | E-Publication |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Detection of black hole node in wireless sensor networks using dsr protocol.docx | 10.57 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.