A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance...

متن کامل

A Security Framework for Replication Attacks in Wireless Sensor Networks

Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain c...

متن کامل

Congestion Control Approaches Applied to Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...

متن کامل

An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks

In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is known that such a many-to-one communication is highly vulnerable to a sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or alters the data passing through it. A sinkhole attack forms a seri...

متن کامل

A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks

7 tions are proposed for wormhole attacks in sensor networks, but only a few of 8 them take mobility of sensor nodes into account. We propose a distributed 9 wormhole detection scheme for mobile wireless sensor networks in which mobility 10 of sensor nodes is utilized to estimate two network features (i.e. network node 11 density, standard deviation in network node density) through using neighb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2016

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2016.071207