• Login
    View Item 
    •   SUSpace Home
    • Faculty of Science and Engineering
    • Department of Computer Science and Engineering
    • 2021 - 2025
    • View Item
    •   SUSpace Home
    • Faculty of Science and Engineering
    • Department of Computer Science and Engineering
    • 2021 - 2025
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Simulation of Blackhole Attack in WSN Cluster Topology

    Thumbnail
    View/Open
    CSE-230142.pdf (3.182Mb)
    Date
    2023-10-15
    Author
    Saha, Ovejite
    Rana, Md Jewel
    Miah, Md. Rajon
    Alamin, Md.
    Metadata
    Show full item record
    Abstract
    Wireless Sensor Networks (WSNs) have sensor nodes that sense and extract information from the surrounding environment, locally processing information and then wirelessly transmitting it to the sink. Data sinks are a fundamental component of data storage, and they play a critical role in ensuring that data is accessible, secure, and reliable. Data sinks work by receiving data from one or more data sources and storing that data in a format that is optimized for retrieval and analysis. Depending on the type of data sink. Wireless multimedia sensor networks (WMSNs) could be present. As multimedia data is larger than scalar data, that’s why we need Wireless Multimedia Sensor Networks (WMSNs). In terms of efficient use of energy, throughput, and reduced end-to-end delay, Multi-path routing is used to discover multi-path during route discovery from source to sink. In blackhole attack, the attacker drops packets selectively, or all control and data packets that are routed through him. Therefore, any packet routed through this intermediate malicious node will suffer from partial or total data loss. Since the data sink attack is detected only after the black hole attack, we used the black hole attack in this case. Considering the point in this thesis are going to implement a Simulation of a Black-hole Attack in WSN. We are showing a simple scenario of attacking if wireless security has some weak points. Cluster Topology is an experiment with the ”NS-2” simulator and discloses enhanced results for multimedia data, Index Terms WMSNs, multimedia data, end-to-end delay, Black hole attack, Cluster topology, NS-2, and multi-path routing. In the simulation, we can understand how a malicious node affects of node and how to drop packets. This is just a simple copy of on process that happened in real life. Some nodes are affected by a malicious node which is an attacker that blocks, drops, sends, and receives packets. We suggest to ensure better security and encryption to prevent this type of case. Overall, we are emphasizing there is a possibility of attacking by hackers with another signal. This attack can be protected by high-level security and a special firewall system, which can control the network as much as possible.
    URI
    http://suspace.su.edu.bd/handle/123456789/704
    Collections
    • 2021 - 2025 [108]

    Copyright © 2022-2025 Library Home | Sonargaon University
    Contact Us | Send Feedback
     

     

    Browse

    All of SUSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2022-2025 Library Home | Sonargaon University
    Contact Us | Send Feedback