Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/252063
Title: | Prevention of Node Clone Attack Secure and Energy Efficient Algorithms in WSN |
Researcher: | Mohindru, Vandana |
Guide(s): | Singh, Yashwant and Bhatt, Ravindara |
Keywords: | Engineering and Technology,Computer Science,Computer Science Interdisciplinary Applications Hybrid Cryptography Message Authentication Node Clone Attack Re-authentication Wireless sensor networks |
University: | Jaypee University of Information Technology, Solan |
Completed Date: | 2019 |
Abstract: | Wireless Sensor Networks (WSNs) are emerging as a commendable choice for monitoring and surveillance application. WSNs are a promising candidate in healthcare, agriculture, and military areas. The reason for the growing popularity of sensor networks is the lightweight sensor nodes. These small sized cost-effective nodes are battery constrained devices with limited computation power and work within short range using wireless communication. These sensor nodes are spatially dispersed in a hostile environment where there is no involvement of human being. The primary motive of these sensor nodes is to sense the physical occurrences in the region-of-interest and perform processing after that transfers the sensed data to the base station. In WSNs, multi-hop communication is preferred for a scalable network. Further, sensor nodes are resource constraints regarding power, computation energy, communication energy, and storage space. The sensor nodes in WSNs are easily approachable by various attackers because sensor nodes are unattended in the hostile environment. An attacker can easily capture sensor nodes, altering information that is being communicated and reduce the capability of the sensor networks to perform its tasks. There are numerous security attacks in the network including clone attacks, Sybil attack, sinkhole attack, traffic analysis attack, wormhole attack, replay attack, black hole attack, and Denial of Service (DDoS) attack. All these attacks have different goals and consequences. Further, these attacks work at different levels during the network lifetime. Out of these security attacks, node clone attack is the most dangerous attacks. In this thesis, we have considered the node clone attack and have proposed the algorithms that secure sensor networks from the node clone attack. In this attack, the attacker compromises the sensor node which is placed in an unattended environment and extracts sensor node secret information like keys and node identification details. newlineSoon after, the attacker starts cloning th |
Pagination: | xvii, 195p. |
URI: | http://hdl.handle.net/10603/252063 |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 52.52 kB | Adobe PDF | View/Open |
02_certificate;declaration;acknowledgement.pdf | 313.14 kB | Adobe PDF | View/Open | |
03_table of contents;list of tables & figures.pdf | 123.03 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 44.45 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 192.4 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 3.67 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.17 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 2.01 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.74 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 818.65 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 65.97 kB | Adobe PDF | View/Open | |
12_references.pdf | 944.74 kB | Adobe PDF | View/Open | |
13_appendix a.pdf | 278.85 kB | Adobe PDF | View/Open | |
14_appendix b.pdf | 276.75 kB | Adobe PDF | View/Open | |
15_appendix c.pdf | 14.3 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: