An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Wireless sensor networks are used for many different applications these days such as in environment applications, military applications, queue tracking, etc. In today’s scenario, security in WSN is one of the major issue.WSN are vulnerable to different types of attacks due to various constraints such as low battery power, less memory, and associated low energy. These attacks lead to decrease in performance of the network, decrease in packet delivery rate. Sybil attack is one of the attacks in which a node forms its multiple identities in the network and thus leads to decrease in performance of the network. Balachandran Nitish et.al discussed various techniques to mitigate Sybil attacks such as trusted certification, resource testing, privilege attenuation, RSSI scheme, random key distribution. By detecting this attack performance of the network can be increased. Also packet drop can be reduced.
Authors and Affiliations
Heena Sharma , Awan Dhawan
A Survey on Access Control of Cloud Data
t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data c...
Preventing SQL Injection Attacks Using Combinatorial Approach
SQL injection is a hazard to web applications, which gives attackers unrestricted access to the database. The attacker thereby can supply malicious or corrupted input that compromises an application. This leads to...
Application Development Using WPF
The paper focuses on the application development using WPF. It covers the overall architecture of WPF. The programming models of the WPF shows how code and XAML is separated and how XAML objects can be accessed. We a...
An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network servic...
Harvesting collective Images for Bi-Concept exploration
Noised positive as well as instructive pessimistic research examples commencing the communal web, to become skilled at bi-concept detectors beginning these examples, and to apply them in a search steam engine for retriev...