Detection of Node Replication Attack in Wireless Mobile Sensor Network Using Paillier

نویسندگان

  • Snehal R. Rane
  • Sachin D. Babar
چکیده

In these days, randomly moving sensor networks are used for building up a application in all the areas like industrial, environmental, and medical and so on. There are some disadvantages of this network over the WSN, this network faces the problem regarding the security attack and they create clones of the nodes. They face this problem because of their dynamic nature. There are some solutions for noticing the attack of node replication. The sensor node generally does not assemble with tamper resistant hardware. This permits the circumstances where the competitor can easily compact the sensor node. There are number of approach are done for noticing node replication offense. The methods like localize algorithm, resisting node replication attack in mobile sensor networks. In this paper we introduced Paillier based method for detecting node replication attack. This method improved the localized algorithm and security and settles the node attack. The proposed system consist of localize algorithm for detecting node replication attack and algorithm to protecting the node replication attack with less storage requirement, processing control and communication transparency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key...

متن کامل

3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks

Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...

متن کامل

Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014