Detection of Node Replication Attack in Wireless Mobile Sensor Network Using Paillier
نویسندگان
چکیده
In these days, randomly moving sensor networks are used for building up a application in all the areas like industrial, environmental, and medical and so on. There are some disadvantages of this network over the WSN, this network faces the problem regarding the security attack and they create clones of the nodes. They face this problem because of their dynamic nature. There are some solutions for noticing the attack of node replication. The sensor node generally does not assemble with tamper resistant hardware. This permits the circumstances where the competitor can easily compact the sensor node. There are number of approach are done for noticing node replication offense. The methods like localize algorithm, resisting node replication attack in mobile sensor networks. In this paper we introduced Paillier based method for detecting node replication attack. This method improved the localized algorithm and security and settles the node attack. The proposed system consist of localize algorithm for detecting node replication attack and algorithm to protecting the node replication attack with less storage requirement, processing control and communication transparency.
منابع مشابه
Unauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملLocation Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network
The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کاملLocation Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network
The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014