Detecting Byzantine Attack using Wireless Sensor Network

File Size:
855.52 kB
Volume 2, Issue 3 (March, 2016)
Publication No:
Shivali Goyal, Gurdeep Kaur, Dr.Parminder Singh
23 x


A wireless sensors networks (WSNs) consist of a large number of nodes which spread over a specific area where we want to look after at the changes going on there. In this paper describe the various attacks such as wormhole attack, cloning, sinkhole, Sybil, blackhole and byzantine attack. These types of networks are much vulnerable to security .Much type of active and passive attacks are possible in sensor network. Byzantine attack is the most common and harmful attack. This attack degrades network performance and leads to denial of service attack. The attack is triggered by the malicious node which is present in the network.  Novel technique has been proposed to detect and isolate malicious node from the network. The novel technique is based on trust values. It will improve network efficiency in terms of packet loss, delay and increase throughput of the network.NS2 simulator tool will be used in it.


Byzantine attack, AODV Protocol, WSNs, CBR.

Tags Associated: