A Survey Paper On Network Attack Detection Using Various Security Techniques
Abstract
Wireless Sensor Network (WSN) is up-and-coming as a capable raised area for diverse areas in military and civilian fields. The sensor network contains infinite tiny sensor nodes with restrictedpossessions with a base station and little rate, less control sensor nodes which are employed forsupervisingprinciples. Since these sensor nodes are little sized and great in amount so these networks are simply apt tothreat. There areseveralpotentialthreats on sensor network such as sinkhole, black-hole, Denial of Service attacks, jamming. Sinkhole threat is one of the morecriticaldirecting threat. Present techniques are not assured enhanced protection and verificationopposing totalthreats in WSN. In order to resolve the problems present techniques are analyzed various techniques of security and authentication methods. In this work, energy efficiency methods, Cluster Head (CH) node selection and attack detection using security methods are performed to improve the secure data transmission process significantly. This survey is also analyzed the advantages and shortcomings of each method applied to WSN. The comparative analysis is done using various security techniques like watermarking method, Hop Count Technique (HCT), Elliptic Curve Cryptography (ECC), homomorphism and Secure Threshold sensitive Energy Efficient sensor Network (TEEN) protocol.Experimentaloutcomes indicate thatSecure TEENapproach provides better performance with regard to lower end to end delay, energy usage and higher throughput, packet delivery ratio and network lifetimerather than the other existing methods