Detection of Replica Nodes in Wireless Sensor Network: A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Network security has become a challenging area, historically only tackled by well qualified andfamiliar experts. Although more pupils are becoming wired, an increasing number of pupils need to understandbasics of security in the network world. The paper is written from the prospective of the basic computer userand information systems administrator, illuminating the concepts needed to go through the hype in themarketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allowthe attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work onreplica node recognition relies on set sensor locations and hence do not work in mobile sensor network. Thepaper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to thesensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can result in a fast and effective detection of mobile replica nodes within wireless sensor network.
Authors and Affiliations
Sandip D. Girase , Ashish T. Bhole
A New Web Document Retrieval Method Using Extended-IOWA (Extended-Induced Ordered Weighted Averaging) Operator on HTML Tags
Abstract: A new scenario has arisen into the information retrieval (IR) field with the increase in the use of mark-up languages. This paper targets structured IR and is focused on documents with structure. This assumptio...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...
PARS: Position based Anonymous Routing Scheme in MANETs
Abstract: Mobile Ad hoc Networks (MANET) comprises of self-organizing autonomous mobile nodes. MANETs are open and decentralized. Therefore they are vulnerable to malicious entities. MANETs are multi-hop wireless n...
A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms
Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...
A cost reduction method in SQA by using inspection and static analysis tool
Quality and cost have close relationship in software development process. That’s why quality has to be better and cost must to be lower for a software developer organization. In our paper, we are presenting an a...