A Secure Model for Detecting Origin Forgery and Packet Drop Attacks in Wireless Network

  • Pranali Salunkhe, Sandesh Thorat , Prateek Parihar, P.T. Suradkar


 Wireless sensor network uses the data collected from various data nodes for the decision-making process. But advisory nodes tend to compromise and temper with the data and because of that data gets altered. Provenance is used for verifying the data but some problems may arise while doing so like bandwidth consumption and space complexity.