Countering Intelligent Dependent Malicious Nodes in Target Detection Wireless Sensor Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Target Tracking Based on Virtual Grid in Wireless Sensor Networks

One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Sensors Journal

سال: 2016

ISSN: 1530-437X,1558-1748,2379-9153

DOI: 10.1109/jsen.2016.2606759