Secure Acknowledgement based Misbehavior Detection in WSN (S-ACK)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET

The nodes in the network that causes dysfunction in network and damage to the other node are misbehaving nodes. They support the flow of route discovery traffic but interrupt the data flow causing the routing protocol to restart the route discovery process. In this paper, an efficient timer based acknowledgement technique is proposed to detect and isolate the misbehaving nodes and can even find...

متن کامل

Secure & Energy-Efficient Intrusion Detection in WSN

Abstract: One of the most important goal in wireless sensor networks is to transmit the information to sink as soon as possible in a secure and energy efficient manner .The important factor that would make it possible to reach this goal is the design of efficient set selection algorithm in which only required number of sensors will be working such that the entire detection area is covered. In a...

متن کامل

―Routing of Misbehavior Nodes in Manets Using Acknowledgement Method‖

A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on pre-existing infrastructure or base stations. Network nodes in MANETs are free to move randomly. The nodes which drop the information to send forward considered as a selfish N...

متن کامل

Countering Node Misbehavior Attacks Using Trust Based Secure Routing Protocol

Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of at...

متن کامل

The Aes Key Based Secure Data Aggregation in Wsn

The security problems like confidentiality, knowledge integrity ,and freshness in knowledge aggregation become crucial once these WSN is deployed in a very remote or hostile atmosphere wherever sensors square measure at risk of node failures and compromises. there's a presently analysis potential in securing knowledge aggregation in WSNs. inside this mind, the protection problems in knowledge a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2016

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2016/v9i40/96063