Show simple item record

dc.contributor.authorSaha, Ovejite
dc.contributor.authorRana, Md Jewel
dc.contributor.authorMiah, Md. Rajon
dc.contributor.authorAlamin, Md.
dc.date.accessioned2023-11-19T05:54:52Z
dc.date.available2023-11-19T05:54:52Z
dc.date.issued2023-10-15
dc.identifier.urihttp://suspace.su.edu.bd/handle/123456789/704
dc.description.abstractWireless Sensor Networks (WSNs) have sensor nodes that sense and extract information from the surrounding environment, locally processing information and then wirelessly transmitting it to the sink. Data sinks are a fundamental component of data storage, and they play a critical role in ensuring that data is accessible, secure, and reliable. Data sinks work by receiving data from one or more data sources and storing that data in a format that is optimized for retrieval and analysis. Depending on the type of data sink. Wireless multimedia sensor networks (WMSNs) could be present. As multimedia data is larger than scalar data, that’s why we need Wireless Multimedia Sensor Networks (WMSNs). In terms of efficient use of energy, throughput, and reduced end-to-end delay, Multi-path routing is used to discover multi-path during route discovery from source to sink. In blackhole attack, the attacker drops packets selectively, or all control and data packets that are routed through him. Therefore, any packet routed through this intermediate malicious node will suffer from partial or total data loss. Since the data sink attack is detected only after the black hole attack, we used the black hole attack in this case. Considering the point in this thesis are going to implement a Simulation of a Black-hole Attack in WSN. We are showing a simple scenario of attacking if wireless security has some weak points. Cluster Topology is an experiment with the ”NS-2” simulator and discloses enhanced results for multimedia data, Index Terms WMSNs, multimedia data, end-to-end delay, Black hole attack, Cluster topology, NS-2, and multi-path routing. In the simulation, we can understand how a malicious node affects of node and how to drop packets. This is just a simple copy of on process that happened in real life. Some nodes are affected by a malicious node which is an attacker that blocks, drops, sends, and receives packets. We suggest to ensure better security and encryption to prevent this type of case. Overall, we are emphasizing there is a possibility of attacking by hackers with another signal. This attack can be protected by high-level security and a special firewall system, which can control the network as much as possible.en_US
dc.language.isoenen_US
dc.publisherSonargaon University (SU)en_US
dc.subjectWSNen_US
dc.subjectCluster Topologyen_US
dc.subjectBlackhole Attacken_US
dc.titleSimulation of Blackhole Attack in WSN Cluster Topologyen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record