A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Nowadays, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by replicas behavior of nodes which would negatively affect the quality of service. Existing schemes in mobile networks incurs efficiency and security problems. In the mobile sensor networks, the node replication attack is a harmful attack where one or more node(s) wrongly claims an identity, are also called clone attack.So, in order to overcome this problem localized algorithms are suggested to resist node replication attacks in mobile sensor networks. The advantages of these algorithms include 1) localized detection; 2) efficiency and effectiveness; 3) network-wide synchronization avoidance; and 4) network-wide revocation avoidance. But the main drawback is high computation complexity and high computation cost. Consequently, the trade-off between security strength and computation overhead has emerged as an area requiring further investigation. So, in order to overcome this trouble an innovative technique is proposed named as Improved Trust based Replica Detection System (ITRDS) which employ clustering algorithm. It is observed that, the proposed scheme decrease the computational complexity, computation cost, computation over head of the network after the detection
Authors and Affiliations
P. Edith Linda , R. Sangeetha , P. Edreena
Analysis and Implementation of Efficient Association Rules using K-mean and Neuralgas Algorithm
Efficient Privacy Preserving association rule mining has emerged as a latest research issue. In this thesis work, existing algorithms, Increase Support of Left Hand Side and Decrease Support of Right Hand Side...
Enhancement in Decision Making with Improved Performance by Multiagent Learning Algorithms
Abstract:The output of the system is a sequence of actions in some applications. There is no such measure as the best action in any in-between state; an action is excellent if it is part of a good policy. A single action...
Processing of Top-k Selection Queries in Relational Database System
Abstract: In many applications, users specify target values for certain attributes, without requiring exact matches to these values in return. Instead, the result to such queries is typically a rank of the top-k tu...
Collective Behavior of social Networking Sites
Now a days a huge data is generated by social media like Facebook, Twitter, Flickr, and YouTube This big data present opportunities and challenges to study collective behavior of data. In this work, we predict collective...
Incorporation of GlobalIssue factors in SDLC by using Inverse Requirement
Abstract: Approval of the project depends on the user's fulfillment and that is just accomplished when the item satisfies client's necessities and requests. Accuracy of necessities assumes a critical part in software dev...