Detection of Clone Attack in Wsn
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: One of the most vexing problems in wireless sensor network security is the node Clone attack. In thisattack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. Therefore first, the desirable properties of a distributed mechanism for the detection of node Clone attacks have been analyzed. Second, the known solutions for this problem do not completely meet our requirements. Third, a new self healing, Randomized, Efficient, and Distributed (RED) protocol for the detection of node Clone attacks has been proposed, and it satisfies the intended requirements.
Authors and Affiliations
Reyaz Ahmad sheikh , Rajeev kumar Arya , Mr. Shubhashish Goswami
An Approach to Sentiment Analysis using Artificial Neural Network with Comparative Analysis of Different Techniques
Abstract : Sentiment Analysis is the process of identifying whether the opinion or reviews expressed in a piece of work is positive, negative or neutral. Sentiment analysis is useful in social media monitoring to automat...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Networks
Abstract: Noise is the most serious issue in the filters and adaptive filters are subjected to this unwanted component. This paper deals with the problem of the adaptive noise and various adaptive algorithms functions wh...
A Combined Approach of Software Metrics and Software Fault Analysis to Estimate Software Reliability
This paper presents a fault prediction model using reliability relevant software metrics and fuzzy inference system. For this a new approach is discussed to develop fuzzy profile of software metrics which are &nb...
Web Logs Analysis for Finding Brand Status
Abstract: Due to rapid development of the web there has been vast increase in the user generated contents available in the form of blogs ,product reviews sites, web- forums and online social networks etc. Such revi...
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...