Loading

Securing Mint Route Protocol in Wireless Sensor Networks
Lakshmi S. Gopal1, Arjun S.2, Remya Nair T.3

1Lakshmi S. Gopal, PG Student, Department of Computer Application, Amrita Vishwa Vidyapeetham School of Arts and Sciences, kochi, Kerala, India.

2Arjun S., PG Student, Department of Computer Application, Amrita Vishwa Vidyapeetham School of Arts and Sciences, kochi, Kerala, India.

3Remya Nair T, Assistant Professor, Department of Computer Application, Amrita Vishwa Vidyapeetham School of Arts and Sciences, kochi, Kerala, India.

Manuscript received on 03 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript Published on 10 July 2019 | PP: 58-61 | Volume-8 Issue-7C2 May 2019 | Retrieval Number: G10150587C219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The proposed research work is an attempt to build an algorithm to resolve an intrusion attack namely; the sinkhole attack from Mint Route protocol, being one of the most commonly used routing protocols in wireless sensor networks. This paper illustrates the working of the protocol and studies it in detail. We emphasize on strategies that an attacker can choose to launch a sinkhole attack. Then we attempt to propose a specific algorithm that may reduce the intrusion threats in wireless sensor networks.

Keywords: Wireless Sensor Networks (WSN), Sinkhole Attack, Mint Route Protocol, Light Weight Extensible Authentication Protocol (LEAP).
Scope of the Article: Energy Harvesting and Transfer for Wireless Sensor Networks