COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 7

Abstract

Wireless sensor networks (WSNs) are exposed and being attacked by opponents as they are randomly deployed in open environments. Opponents can extract confidential information like secret keys by inserting their own nodes as compromised nodes and uses them to introduce various security attacks. So detection of such nodes is being the major issue to be addressed. In this paper we present Compro-Moto – as an efficient intrusion detection system to detect compromised nodes in WSNs. Simulation results clearly shows the benefits of Compro-Moto :(i). It is not sensitive to any kind of security attacks (ii).It endows detection range up to 99.99%. (iii)It endows false detection rate less than 1%in WSNs.(iv).It endows less total overhead and less packet loss rate. These benefits are the  achievement of Compro-Moto system that requires little memory and less communication overhead and also it can scale up to millions of nodes.

Authors and Affiliations

Vinayaka S. N, M Dakshayini

Keywords

Related Articles

AUTOMATIC ENERGY SAVING (AES) MODELTO BOOST UBIQUITOUS WIRELESS SENSOR NETWORKS (WSNs)

We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with nove...

AN IMPROVED RESOURCE ALLOCATION STRATEGY BASED ON PACKAGE LEVEL ACCESS IN CLOUD ENVIRONMENT

Cloud computing is an emerging field of computer science, where heterogeneous services such as applications, servers and storage are delivered to an individual or organization's computer and devices through the Internet....

A Comparative Analysis of Feed-Forward and Generalized Regression Neural Networks for Face Recognition Using Principal Component Analysis

In this paper we give a comparative analysis of performance of feed forward neural network and generalized regression neural network based face recognition. We use different inner epoch for different input pattern accor...

A Novel Way to Detect Hard Exudates Using Dynamic Thresholding Technique in Digital Retinal Fundus Image

Diabetic retinopathy is considered to be one of the major causes of blindness among diabetes mellitus patients. Due to diabetic retinopathy blood vessels of retina gets damaged and fat, lipoprotein substances gets leaked...

CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD

KDD process includes how data is stored and accessed, how andwhat algorithms can apply to large amount of data efficiently,how results can be interpreted and visualized. KDD is theprocess of identifying valid, interestin...

Download PDF file
  • EP ID EP650562
  • DOI 10.24297/ijct.v13i7.2503
  • Views 72
  • Downloads 0

How To Cite

Vinayaka S. N, M Dakshayini (2014). COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(7), 4638-4646. https://europub.co.uk/articles/-A-650562