Adversary Detection in Wireless Sensor Networks Under Byzantine Attacks
Journal: International Journal of Engineering and Technical Research (www.erpublication.org) (Vol.1, No. 10)Publication Date: 2013-12-30
Authors : P. Sathya Priya; S. Lokesh;
Page : 43-45
Keywords : erpublication; IJETR;
Abstract
This work discovers reliable data fusion which overcome coverage problem in mobile access wireless sensor networks under Byzantine attacks. Consider the q-out-of-m rule, in which final decision is made based on the q sensing reports out of m polled nodes and can achieve a good trade-off between the miss detection probability and the false alarm rate. In this work, first, propose a simplified, topology construction which construct and maintains an efficient network topology. Second, propose a multicast message transmission where multicasting requires special techniques that make clear who is in the intended group of recipients. Finally, propose a simple and effective malicious node detection approach, where the malicious sensors are identified by comparing the decisions of the individual sensors with that of the fusion center. This work further proposes the adversary node detection approach and adapts the fusion parameters based on the detected malicious sensors. Simulation examples are presented to illustrate the performance of proposed approaches.
Other Latest Articles
- Machining of Glass Fiber Reinforcement Epoxy Composite
- Kinetics Study of the Solvent Extraction of Lipids from Chlorella vulgaris
- Legendre, Grimm, Balanced Prime, Prime triplet, Polignac's conjecture, a problem and 17 tips with proof to solve problems on number theory
- Solar PV Based Zeta Converter with Capacitor Multiplier and Coupled Inductor for DC Drive Application
- Synthesis and Physiochemical studies of some metal complexes of Ti(III) with Phthalimide or Succinimide
Last modified: 2017-06-25 16:21:54