CREDENTIAL - BASED NODE REPLICATION DETECTION SCHEME FOR WIRELESS SENSOR NETWORK
Journal: International Journal OF Engineering Sciences & Management Research (Vol.3, No. 12)Publication Date: 2016-12-30
Authors : J. Sybi Cynthia; D. Shalini Punithavathani;
Page : 34-45
Keywords : Denial of Service attack; wireless sensor network; Unassailable Randomized; Efficient and Distributed Protocol; Ardent Randomized; Efficient and Distributed Protocol.;
Abstract
A gathering of hubs that are improved into an agreeable network is called as the wireless sensor network. Accordingly, wireless sensor networks (WSNs) are inclined to a wide assortment of physical attacks. In this paper, we consider a run of the mill risk known as hub replication attack or clone hub attack, where an enemy makes its own minimal effort sensor hubs called clone hubs and misguides the network to recognize them as honest to goodness hubs. Recognizing the hub replication attack has turned into a basic examination subject in sensor network security, and planning identification plans against this attack includes distinctive undermining issues and difficulties, a self - mending, randomized and appropriated convention to recognize hub replication attack s were Ardent Randomized, Efficient and Distributed Protocol (ARED). Systematically demonstrated that our protocol has somewhat higher overhead yet accomplishes amazing changes in malevolent hub identification likelihood and therefore equitably adjusted am ong the hubs.
Other Latest Articles
Last modified: 2016-12-20 20:41:05