Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
نویسندگان
چکیده
منابع مشابه
Improving Energy Consumption by Using Cluster Based Routing Algorithm in Wireless Sensor Networks
Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. In this paper, a new clustering based multi path routingprotocol namely ECRR (Energy efficient Cluster based Routing algorithm for improving Reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required QoS ...
متن کاملA Novel Sybil Attack Detection Technique for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are susceptible to Sybil attacks in which malicious node creates a huge number of fake identities in order to gain an excessively high advantage through a Byzantine method. A Sybil node using only one physical device may generate random number of additional node identities and can be used to disrupt normal functioning of the WSN, such as multipath routing which i...
متن کاملThe sybil attack in sensor networks: analysis & defenses
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important f...
متن کاملimproving energy consumption by using cluster based routing algorithm in wireless sensor networks
multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. in this paper, a new clustering based multi path routingprotocol namely ecrr (energy efficient cluster based routing algorithm for improving reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required qos ...
متن کاملLocation Verification Based Defense Against Sybil Attack in Sensor Networks
Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols including...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Grid and Distributed Computing
سال: 2014
ISSN: 2005-4262,2005-4262
DOI: 10.14257/ijgdc.2014.7.5.02