A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Nowadays, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by replicas behavior of nodes which would negatively affect the quality of service. Existing schemes in mobile networks incurs efficiency and security problems. In the mobile sensor networks, the node replication attack is a harmful attack where one or more node(s) wrongly claims an identity, are also called clone attack.So, in order to overcome this problem localized algorithms are suggested to resist node replication attacks in mobile sensor networks. The advantages of these algorithms include 1) localized detection; 2) efficiency and effectiveness; 3) network-wide synchronization avoidance; and 4) network-wide revocation avoidance. But the main drawback is high computation complexity and high computation cost. Consequently, the trade-off between security strength and computation overhead has emerged as an area requiring further investigation. So, in order to overcome this trouble an innovative technique is proposed named as Improved Trust based Replica Detection System (ITRDS) which employ clustering algorithm. It is observed that, the proposed scheme decrease the computational complexity, computation cost, computation over head of the network after the detection
Authors and Affiliations
P. Edith Linda , R. Sangeetha , P. Edreena
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
Based on mobile nature in MANET, there is no doubt that all routing protocols have some route errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route &nbs...
Trust Based Secure Payment Scheme for Multi-hop Wireless Networks
In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks.This micro payment scheme enhances the cooperation of nodes and fairness of the network. Each node...
Load Balancing In Cloud Computing:A Review
As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this increasi...
A Proposed Method to Develop Shared Papers for Researchers at Conference
Abstract: In conferences, the topics of interest for papers include variety of subjects, if the researcher wants to write a shared researched paper on specific subject with another researcher who is also interested in th...