• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Distributed Scheme

Cached

  • Download as a PDF

Download Links

  • [www.ijesrt.com]
  • [www.ijesrt.com]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Unknown Authors
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{_distributedscheme,
    author = {},
    title = {Distributed Scheme},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

The most wireless sensor networks are composed of unshielded sensor nodes. An adversary can easily attack, analyze and clone the unshielded sensor nodes and create replicas and insert them in the networks. This gives the adversary to carry on large class of insidious attacks like disrupting communication, subverting data aggregation, eavesdropping etc … in this research we resist against node replication attacks in mobile sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. in this protocol, efficient and distributed scheme and sequential probability ratio test are used to security that the replica nodes enters in to the monitoring area containing number of nodes under consideration the path travelled by the replica nodes are monitored and other nodes present I the area are prevented from attack using the efficient and distributed scheme.

Keyphrases

distributed scheme    unshielded sensor node    node present    large class    wireless sensor network    insidious attack    new protocol    node replication attack    sequential probability ratio test    monitoring area    mobile wsns    replica node    data aggregation    mobile sensor network   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University