Detection of Replica Nodes in Wireless Sensor Network: A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Network security has become a challenging area, historically only tackled by well qualified andfamiliar experts. Although more pupils are becoming wired, an increasing number of pupils need to understandbasics of security in the network world. The paper is written from the prospective of the basic computer userand information systems administrator, illuminating the concepts needed to go through the hype in themarketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allowthe attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work onreplica node recognition relies on set sensor locations and hence do not work in mobile sensor network. Thepaper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to thesensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can result in a fast and effective detection of mobile replica nodes within wireless sensor network.
Authors and Affiliations
Sandip D. Girase , Ashish T. Bhole
A Study on Geomorphological Response for Runoff Prediction in Small Watershed
Abstract: Hydrological data of Arki sub-watershed comprising an area of 2460 hectares of a hilly catchment of Upper River Gambhar, located in mid hills of Solan district of Himachal Pradesh were analyzed to study t...
Addressing Mental Health Epidemic among University Students via Web-based, Self-Screening, and Referral System
The prevalence and severity of mental health problems in college and university communities are alarming. How-ever, the majority of students with mental disorders do not seek help from professionals.To help students...
A Review on Face Recognition and Video Databases
Abstract: Each And Every Face Databases Have Its Own Limitations And Description To Test The Performance Of Face Recognition Technique. Even Though, Current Machine Recognition Systems Have Approached To Certain Level Of...
Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks
A mobile ad hoc network (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routi...
A Comparative Study of Two Microprocessor Based Distributed Systems: Intel Xeon and AMD Opteron
Abstract: In this article, we draw a comparative study of microprocessor–based distributed systems, using the two major processors; Intel and AMD. Although the philosophy of their microarchitecture is the same, the...