A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Nowadays, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by replicas behavior of nodes which would negatively affect the quality of service. Existing schemes in mobile networks incurs efficiency and security problems. In the mobile sensor networks, the node replication attack is a harmful attack where one or more node(s) wrongly claims an identity, are also called clone attack.So, in order to overcome this problem localized algorithms are suggested to resist node replication attacks in mobile sensor networks. The advantages of these algorithms include 1) localized detection; 2) efficiency and effectiveness; 3) network-wide synchronization avoidance; and 4) network-wide revocation avoidance. But the main drawback is high computation complexity and high computation cost. Consequently, the trade-off between security strength and computation overhead has emerged as an area requiring further investigation. So, in order to overcome this trouble an innovative technique is proposed named as Improved Trust based Replica Detection System (ITRDS) which employ clustering algorithm. It is observed that, the proposed scheme decrease the computational complexity, computation cost, computation over head of the network after the detection
Authors and Affiliations
P. Edith Linda , R. Sangeetha , P. Edreena
A Methodology forDesigning High Confidence Pattern viaEventB: Insulin Infusion Pump Case Study
The correct formal design is anachievement in software engineering, but we faced with challenges to satisfy that. The informal problems types are general or special. The special informal problems depend on the case study...
Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process
today’s world.Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protect...
Penetrating Windows 8 with syringe utility
: Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
Energy Efficiency in Key Management of Body Sensor Network
Abstract: In this research, we have developed an algorithm that maintains the shape and integrity of the BioSignalover Body- Sensor Network. A new approach has been experimented successfully using set theoryoperators (un...