dc.description.abstract | Wireless Sensor Networks (WSNs) have sensor nodes that sense and extract information
from the surrounding environment, locally processing information and then wirelessly
transmitting it to the sink.
Data sinks are a fundamental component of data storage, and they play a critical role in
ensuring that data is accessible, secure, and reliable. Data sinks work by receiving data
from one or more data sources and storing that data in a format that is optimized for
retrieval and analysis. Depending on the type of data sink.
Wireless multimedia sensor networks (WMSNs) could be present. As multimedia data
is larger than scalar data, that’s why we need Wireless Multimedia Sensor Networks
(WMSNs). In terms of efficient use of energy, throughput, and reduced end-to-end delay,
Multi-path routing is used to discover multi-path during route discovery from source to
sink.
In blackhole attack, the attacker drops packets selectively, or all control and data packets
that are routed through him. Therefore, any packet routed through this intermediate
malicious node will suffer from partial or total data loss. Since the data sink attack is
detected only after the black hole attack, we used the black hole attack in this case.
Considering the point in this thesis are going to implement a Simulation of a Black-hole
Attack in WSN. We are showing a simple scenario of attacking if wireless security has
some weak points. Cluster Topology is an experiment with the ”NS-2” simulator and
discloses enhanced results for multimedia data, Index Terms WMSNs, multimedia data,
end-to-end delay, Black hole attack, Cluster topology, NS-2, and multi-path routing. In
the simulation, we can understand how a malicious node affects of node and how to drop
packets. This is just a simple copy of on process that happened in real life. Some nodes are
affected by a malicious node which is an attacker that blocks, drops, sends, and receives
packets.
We suggest to ensure better security and encryption to prevent this type of case. Overall,
we are emphasizing there is a possibility of attacking by hackers with another signal.
This attack can be protected by high-level security and a special firewall system, which
can control the network as much as possible. | en_US |