Securing mint route protocol in wireless sensor networks

ISSN: 22783075
0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

The proposed research work is an attempt to build an algorithm to resolve an intrusion attack namely; the sinkhole attack from MintRoute protocol, being one of the most commonly used routing protocols in wireless sensor networks. This paper illustrates the working of the protocol and studies it in detail. We emphasize on strategies that an attacker can choose to launch a sinkhole attack. Then we attempt to propose a specific algorithm that may reduce the intrusion threats in wireless sensor networks.

Cite

CITATION STYLE

APA

Gopal, L. S., Arjun, S., & Remya Nair, T. (2019). Securing mint route protocol in wireless sensor networks. International Journal of Innovative Technology and Exploring Engineering, 8(7C2), 58–61.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free