ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CREDENTIAL - BASED NODE REPLICATION DETECTION SCHEME FOR WIRELESS SENSOR NETWORK

Journal: International Journal OF Engineering Sciences & Management Research (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 34-45

Keywords : Denial of Service attack; wireless sensor network; Unassailable Randomized; Efficient and Distributed Protocol; Ardent Randomized; Efficient and Distributed Protocol.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A gathering of hubs that are improved into an agreeable network is called as the wireless sensor network. Accordingly, wireless sensor networks (WSNs) are inclined to a wide assortment of physical attacks. In this paper, we consider a run of the mill risk known as hub replication attack or clone hub attack, where an enemy makes its own minimal effort sensor hubs called clone hubs and misguides the network to recognize them as honest to goodness hubs. Recognizing the hub replication attack has turned into a basic examination subject in sensor network security, and planning identification plans against this attack includes distinctive undermining issues and difficulties, a self - mending, randomized and appropriated convention to recognize hub replication attack s were Ardent Randomized, Efficient and Distributed Protocol (ARED). Systematically demonstrated that our protocol has somewhat higher overhead yet accomplishes amazing changes in malevolent hub identification likelihood and therefore equitably adjusted am ong the hubs.

Last modified: 2016-12-20 20:41:05