Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/22089
Title: | Prevention of node replication attacks in wireless sensor networks using unified defense methods |
Researcher: | Anandkumar, K M |
Guide(s): | Jayakumar, C |
Keywords: | Distance Vector Based Detection Information and communication engineering Open System Interconnection Wireless networks Wireless Sensor Networks |
Upload Date: | 5-Aug-2014 |
University: | Anna University |
Completed Date: | 01/11/2012 |
Abstract: | The main objective of this research work is to develop an enhanced newlinealgorithm and methodology for solving node replication attack problems in newlinewireless sensor networks Wireless sensor networks may be deployed in hefty self organized and adaptable fields for many applications such as military environmental health care remote sensing Unfortunately the simplicity of the design of these sensors makes replication of compromised nodes easy by attackers inside or outside the network This replication attack is the entry point for a large span the number of sinister attacks During such an attack an adversary uses the credentials of a compromised node to introduce the replicas secretly into the network These replicas are then used to launch a variety of attacks that challenge the sensor applications Therefore the detection of node replication attacks called clone attacks in a wireless sensor network is a fundamental problem The proposed Secured Randomized Efficient and Distributed algorithm relates only to static sensor network This not only detects newlinebut isolates the clone node s This new algorithm is developed by the combined application of location and ID based detection methods The amendments made in the classical Randomized Efficient and Distributed algorithm ensure reliable and faster convergence in obtaining a global optimum The algorithm executes routinely at fixed intervals of time Every run of the protocol consists of three steps In the first step a random value isshared among all the nodes This random value can be broadcasted with a centralized mechanism In the second step each node digitally signs and locally broadcasts its claim ID and geographic location Then the third step involves using another witness through random selection to verify the statement of the first witness This ensures the security level of the network and overcomes the drawback of the classical RED Algorithm newline |
Pagination: | xxi, 172p. |
URI: | http://hdl.handle.net/10603/22089 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 68.69 kB | Adobe PDF | View/Open |
02_certificate.pdf | 399.98 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 28.13 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 20.01 kB | Adobe PDF | View/Open | |
05_contents.pdf | 57.53 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 217.84 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 66.2 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 1.65 MB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 801.39 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 2.22 MB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 2.28 MB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 30.96 kB | Adobe PDF | View/Open | |
13_references.pdf | 56.46 kB | Adobe PDF | View/Open | |
14_publications.pdf | 29.59 kB | Adobe PDF | View/Open | |
15_vitae.pdf | 21.91 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: