Detecting Malicious Storage Node in WSN

Abstract

The architecture of two-tiered sensor networks where the storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries has been widelyadopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. The importance of storage nodes also makes them attractive to attackers. The SafeQ a protocol that prevents attackers from gaining information from both sensor collected data and sink issue queries. SafeQ also allows a sink to detect compromise storage nodes. To preserve privacy SafeQ use a novel techniques to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. The preserve integrity have two schemes one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information.

Authors and Affiliations

Beebi Sufia Sheik, T. Rajendra Prasad

Keywords

Related Articles

Performance Analysis of Pilot Based Channel Estimation in OFDM System using Recursive Least Square Estimator

For a wireless communication system, the channel is unknown a priori to the receiver. Channel parameter estimation is used for improving data transmission performance. To estimate the channel properties and correct t...

Design of Intelligent Transport Related Issue System Based On ARM7

There are millions of vehicles are passing through roads every day. Time, safety and efficiency are the major factors, While mode of transportation plays an important role in urbanization. Through this paper integrat...

Reduced Power In Processor Cache Using New Cache Architecture

In recent years, many high-performance microprocessors employ cache write-through policy for performance improvement. Multi-core chips also allow higher performance at lower energy. A multi-core processor implements...

Performance Based Symmetric Load Balancing Algorithm

Mainly Distributed Hash Table uses decentralized load balance algorithms which are based on virtual servers for participating in asymmetric peers. Require the participating peers to be asymmetric, thereby introducing...

Resource Provisioning Techniques in Cloud Computing Environment: A Survey

Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...

Download PDF file
  • EP ID EP27715
  • DOI -
  • Views 261
  • Downloads 4

How To Cite

Beebi Sufia Sheik, T. Rajendra Prasad (2013). Detecting Malicious Storage Node in WSN. International Journal of Research in Computer and Communication Technology, 2(10), -. https://www.europub.co.uk/articles/-A-27715