In Multi-Hop Routing identifying trusted paths through TARF in Wireless sensor networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 6
Abstract
The multi-hop routing in wireless sensor networks (WSNs) highly vulnerable against identity cheating through replaying routing data. An attacker can uses this drawback to launch various serious or even disturbing attacks against the routing protocols, like sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further forced by mobile and unkind network conditions. old cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this serious problem. To secure the WSNs against attackers misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those dangerous attacks developed out of identity cheat; the flexibility of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented allow-overhead TARF module in TinyOS; as demonstrated, this implementation can be included into existing routing protocols with the little effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Authors and Affiliations
P. Esswaraiah, Ch. Srilakshmi
A Novel Data Leakage Detection
Abstract: This paper contains concept of data leakage, its causes of leakage and different techniques to detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the f...
On Chip Bus Tracer Based On Reverse Encoding In Soc
Abstract: System on chip (SoC) is the integration of different components in to a single chip targeting a specific application. Real-time observability of the internal chip signals is crucial to SoC debugging, the...
Managing Business Analysis for Agile Development
Abstract: Agile development methodologies are helping software companies and development teams to align to the newevolving economy. Agile gainsay and hampers our notion of software engineering practices and project...
Results from set-operations on Fuzzy soft sets
In this paper considering a class of Fuzzy-Soft Sets, seven set operations are defined and several relations arising from these set-operations are established using matrix representation of fuzzy soft sets.
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman filter Techniques
The ability to obtain accurate predictions of bus arrival time on a real time basis is vital to both bus operations control and passenger information systems. Several studies have been devoted to this arrival tim...