Detecting Malicious Storage Node in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
The architecture of two-tiered sensor networks where the storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries has been widelyadopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. The importance of storage nodes also makes them attractive to attackers. The SafeQ a protocol that prevents attackers from gaining information from both sensor collected data and sink issue queries. SafeQ also allows a sink to detect compromise storage nodes. To preserve privacy SafeQ use a novel techniques to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. The preserve integrity have two schemes one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information.
Authors and Affiliations
Beebi Sufia Sheik, T. Rajendra Prasad
Improved technique for object detection using Similarity Based Region Merging
object segmentation is an important task in image processing and computer vision. We address a method to effectively discover a user’s concept when object of interest are involved in input image. In this paper our met...
Secured Diversified Data set Selection From Dynamic Data
Once the data is created, the data that it contains doesn’t change is known as static data (ex: newspaper).Where as the data can be change and update in the dynamic data (ex: website). A lot of information available...
Implementation of Grid Based Distributed 3P4W System Using ANFIS Control
The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....
Optimal Price Setting For Video Stream Redistribution in Mobile Networks
Now a days mobile device became a necessity for the people and with this 3G network service consumer can watch he video program by subscribing data plans from the various service providers. Due to heavy use of mobile...