Malicious Node Detection in WSN Using WTE
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 4
Abstract
Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the networks operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malicious nodes, both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability. Shabnam Kumari | Sumit Dalal | Rashmi"Malicious Node Detection in WSN Using WTE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14611.pdf http://www.ijtsrd.com/computer-science/computer-network/14611/malicious-node-detection-in-wsn-using-wte/shabnam-kumari
Retrieval Process in Cloud Computing: An Assessment
This paper presents the survey on data storage and retrieval in cloud computing. In this paper the study on scope and security issues related to data storage and information retrieval in cloud computing is done. Data sto...
A Performance Appraisal of the Pedagogic in Service Training Programme ISTP Multiplicators in C.B.C. Secondary Schools of the North West Region Teachers' Perspective
This paper sought to investigate the level of utilization of the prerequisites to supervision of instruction by the ISTP Multiplicators in CBC secondary schools of the NWR teachers perspective. The study progressed as gu...
Detect Mood and Play Song Accordingly
There are different moods of data sources primarily audio, image, text, and sensors. Human mood is identified from facial expression and speech tones. Physical activities are used to be detected by sensors which humans c...
Swach Bharat Abhiyan Challenges and Prospects
Swach Bharat Abhiyan, it means that clean India mission it is a national level campaign launched by the Government of India on 2nd October 2014 to accelerate the efforts to achieve universal sanitation coverage. It is a...
Analytic System Based on Prediction Analysis of Social Emotions from Users : A Review
Over social media there are lots of symbols are used as compared to text this is an unstructured type of which get considers day by day increase in such symbols is moving the towards the new data prediction determination...