Clone Detection Using Enhanced EDD (EEDD) with Danger Theory in Mobile Wireless Sensor Network
نویسندگان
چکیده
منابع مشابه
Detection of Clone Attack in Mobile Wireless Sensor Network
Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of t...
متن کاملDynamic Node Clone Detection Approach in Wireless Sensor Network
Sensor nodes that are placed in hostile environment are easily captured and compromised by any adversary entering into the network. The adversary creates multiple numbers of identical duplicates and adds it to network to reprove the network’s performance. This type of attacks in wireless sensor network are called cloning attacks. Considering a static network in the existing system, two protocol...
متن کاملPerformance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks, pdfkeywords=wireless sensor network (WSN), clone attack, intrusion detection, mobility
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملTopology Control in Wireless Sensor Network using Fuzzy Logic
Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2015
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2015.9.4.18