Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 1, Issue 1, 2014, Page No: 65-69

In Mobile Sensor Networks Localized Algorithms for Detection of Node Replication Attacks

Sinthiya1, S. Abirami2

1.M.E (CSE) I Year, RVS College of Engineering and Technology, Dindigul.
2.Assistant Professor Dept of CSE, RVS School Of Engineering, Dindigul.

Citation : Sinthiya, S. Abirami, In Mobile Sensor Networks Localized Algorithms for Detection of Node Replication Attacks International Journal of Research Studies in Computer Science and Engineering 2014, 1(1) : 65-69

Abstract

A wireless Sensor Network transfers the data one node to another node, energy efficient manner. The captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is a so called node replication attack. The Range Based Detection Method (RBDM) to replication attacks are proposed to resist node replication attacks in mobile sensor networks. Finally, it can be network-wide revocation avoidance, time conception also avoided. The challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, compared to the extensive exploration on the defense against node replication attacks in static networks, only a few solutions in mobile networks have been presented. Moreover, while most of the existing schemes in Static networks rely on the witness-finding strategy, which cannot be applied to mobile networks, the velocity-exceeding strategy used in existing schemes in mobile networks incurs efficiency and security problems. Therefore, based on our devised challenge- and-response and encounternumber approaches, localized algorithms are proposed to resist node replication attacks in mobile sensor networks. The advantages of our proposed algorithms include localized detection; efficiency and effectiveness; network-wide synchronization avoidance; and network-wide revocation avoidance. Performance comparisons with known methods are provided to demonstrate the efficiency of our proposed algorithms. Prototype implementation on TelosB mote demonstrates the practicality of our proposed methods.


Download Full paper: Click Here