Replica Node Attacks Detection in Mobile Sensor Networks Using Efficient and Distributed Scheme
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 5
Abstract
The most wireless sensor networks are composed of unshielded sensor nodes. An adversary can easily attack, analyze and clone the unshielded sensor nodes and create replicas and insert them in the networks. This gives the adversary to carry on large class of insidious attacks like disrupting communication, subverting data aggregation, eavesdropping etc… in this research we resist against node replication attacks in mobile sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. in this protocol, efficient and distributed scheme and sequential probability ratio test are used to security that the replica nodes enters in to the monitoring area containing number of nodes under consideration the path travelled by the replica nodes are monitored and other nodes present I the area are prevented from attack using the efficient and distributed scheme.
Authors and Affiliations
R. Kalichamy
ASSORTED DIRECTIONS OF AUTHENTICATION IN BIOMETRIC SYSTEMS
Biometrics refers to a way of authentication in the world of computer security using various metrics linked to human characteristics. It is used for access control and recognition of individuals. This paper provid...
WATERMARK-BASED CORRELATION THROUGH STEPPING STONES IN ENCRYPTED ATTACK TRAFFIC
In global network intruders having attack their data directly from their own computer. Often, this attack is coming from directly “stepping stones” in order to conceal their identity of data and original data. To identi...
ASSESSEMENT OF QUALITY PROBLEMS FOR HIGH RISE UILDING-CASE STUDY
Quality is one of the critical factors in the success of construction projects. Quality of construction projects, as well as project success, can be regarded as the fulfilment of expectations (i.e. the satisfaction...
A Survey on Evolution of Mobile Networks:1G to 4G
In this paper, we discuss generations of mobile networks and its step by step evolution. Mobile communications using wireless technology began in 1970s known as zeroth generation. Today it has reached till fourth...
IMAGE ENCRYPTION USING SECURE FORCE ALGORITHM WITH AFFINE TRANSFORM FOR WSN
ith the ever increasing growth of multimedia applications,security is an important issue in communication and storage of images. Encryption is one of the ways to ensure security.Image encryption techniques try...