Detecting Malicious Nodes in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract:A typical wireless sensor network consists of several tiny and low-power sensors which use radio frequencies to perform distributed sensing tasks. Wireless sensor networks are used to detect the occurrence of events such as fires, intruders, or heart attacks, malicious data can be injected to create fake events, and thus trigger an undesired response, or to mask the occurrence of actual events. In this project we consider directly the scenario where an attacker gains full control of one or more sensors and can run arbitrary malware on them to fabricate new measurements and report them in place of the observed ones. Our base work only concentratedon the malicious data injection, we enhanced our base work with detecting the sink hole attack and avoiding the sink hole node to transfer the data.
Authors and Affiliations
K. V. V. S. Pravallika, M. Tech ; , Mrs. S. Venkata Lakshmi, M. Tech
Crawler with Search Engine based Simple Web Application System for Forum Mining
Abstract : Now-a-days the growth of online users increased infinitely depending upon the information in web sources. Web mining is an important term to manage the data from web which has different categorization as...
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
A key requirement for service differentiation as required in Internet of the future and QoS to work effectively is the extension of traffic management routines of the current TCP/IP protocol. Two among of such &n...
A Study on Energy Model Prototyping in Various Simulators of WSN
Simulators are used to abstract the real hardware behaviors and proceed the research more economically. Various simulators of Wireless Sensor Network (WSN) are used to access the performance and transmission processes in...
Mining Conceptual Relations from Textual Web Content Using Leximancer
Abstract: Concept mining is a process that focuses on extracting ideas and concepts found in documents. The approach is somewhat similar to text mining, with the main difference being that mining a text focuses on...
Development of Virtual Computing Lab Using Private Cloud
Abstract: Virtual Computing Lab (VCL) is a very effective answer for the educational institution to meet the increasing demand of physical machines, different computational laboratories and large number of users in alimi...