Security Analysis in Wireless Sensor Network Using Time Synchronization

Authors

  • Shyam Narayan Patel School of Electronics Engineering, VIT Chennai, (T.N.) India
  • Akash Singh Chauhan School of Electronics Engineering, VIT Chennai, (T.N.) India

Keywords:

WSN, Cryptography, Time synchronization, Sybil attack

Abstract

This paper proposes a security mechanism that uses a time synchronization Protocol between the base station and
node. It also provides the good packet delivery ratio. In this paper we propose a security algorithm by introducing a
MASTER NODE which provides the timestamp of every stage of data routing. By this approach it identifies the malicious
node by using time synchronization approach. A main objective of this approach is to avoid the delay. With the time
synchronization protocol it identifies the Sybil attack, and packet replay attack and denial of services attack.

Published

2014-10-25

How to Cite

Security Analysis in Wireless Sensor Network Using Time Synchronization. (2014). International Journal of Advance Engineering and Research Development (IJAERD), 1(10), 40-45. https://ijaerd.org/index.php/IJAERD/article/view/292

Similar Articles

1-10 of 1637

You may also start an advanced similarity search for this article.