Protocols for detection of node replication attack on wireless sensor network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These attacks mainly fall into two categories that is application dependent and application independent .In this paper the focus is on the node replication attack which falls under application independent attacks. In this paper a survey has been done related to node replication attack and existing techniques for solving this issue has been studied. The paper mainly focuses on the types of attacks on wireless sensor network and the two techniques centralized and distributed detection for detection of the node replication attack. Defending against this node replication attack is recently become a research topic in the security of wireless sensor network. The applications and advantages of centralized detection and distributed detection and their respective limitations has been studied.
Authors and Affiliations
Mrs: Suvarna Game
A Face Recognition Scheme Based On Principle Component Analysis and Wavelet Decomposition
Abstract: In this paper, a new face recognition system based on Wavelet transform (HWT) and Principal Component Analysis (PCA) is presented. The image face is preprocessed and detected. The Haar wavelet is used...
Performance Comparison of SVM and ANN in Predicting Compressive Strength of Concrete
Abstract : Concrete compressive strength prediction is very important in structure and building design, particularly in specifying the quality and measuring performance of concrete as well as determination of its mix p...
Enhanced Data Processing Using Positive Negative Association Mining on AJAX Data
Knowledge discovery is the process of analyzing data from different perspectives and summarizing it into useful information. [1] Association rule mining is a data mining process used widely in traditional databases to fi...
Automated Car Number Plate Detection System to detect far number plates
Abstract: The Automatic number plate recognition (ANPR) is a mass reconnaissance strategy that uses optical character recognition on pictures to peruse the tags on vehicles. They can use existing shut circuit TV or stree...
The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing
Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...