Replica Node Attacks Detection in Mobile Sensor Networks Using Efficient and Distributed Scheme

Abstract

The most wireless sensor networks are composed of unshielded sensor nodes. An adversary can easily attack, analyze and clone the unshielded sensor nodes and create replicas and insert them in the networks. This gives the adversary to carry on large class of insidious attacks like disrupting communication, subverting data aggregation, eavesdropping etc… in this research we resist against node replication attacks in mobile sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. in this protocol, efficient and distributed scheme and sequential probability ratio test are used to security that the replica nodes enters in to the monitoring area containing number of nodes under consideration the path travelled by the replica nodes are monitored and other nodes present I the area are prevented from attack using the efficient and distributed scheme.

Authors and Affiliations

R. Kalichamy

Keywords

Related Articles

FEEDBACK MANAGEMENT SYSTEM

The main purpose of this project is to develop a feedback Management System for Engineering college students. This system is developed for only the engineering college students for giving their feedback directly to the...

 ANALYSIS & COMPARISION OF INVENTORY COST BY GENETIC ALGORITHM, INVERTED METHOD AND FITNESS FUNCTION

 Inventory is the list of movable items which are required for manufacturing the product or assembly the system to maintain the plant. Inventory is directly related with the manufacturing cost. Inventory control ref...

Bone Quality Assessment Using MEMS Accelerometer

Bone Mineral Density (BMD) is the amount of mineral per square centimeter of bone. Osteoporosis is defined as a systemic skeletal disease characterized by low bone mass and micro architectural deterioration of bone tiss...

 CRYSTALLINITY ANALYSIS OF COMPOSITE COATING ON Al SUBSTRATE BY ELECTROPLATING METHOD

 Ni-P-TiO2 composite coatings were prepared on aluminium substrate by TiO2 sol-enhanced electroplating. A systematic crystallinity study has been conducted in order to understand the effect of heat treatment on the...

 INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

 Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring g...

Download PDF file
  • EP ID EP90192
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

R. Kalichamy (30). Replica Node Attacks Detection in Mobile Sensor Networks Using Efficient and Distributed Scheme. International Journal of Engineering Sciences & Research Technology, 2(5), 1207-1217. https://europub.co.uk/articles/-A-90192