MadCD: A Mobile Agent Based Distributed Clone Detection Method in Mobile WSNs
نویسندگان
چکیده
Sensor nodes used in enemy environments are disposed to capture and Compromise. An adversary may obtain secret information from sensors, such attack is named as clone attack. The clone attack, Replicate nodes and arrange them in the network to launch a variety of other attacks. In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of researchists use mobile agents as a novel template for distributed purpose to dominate the limitations of sensor nodes. Recently, several solutions are proposed to tackle clone attacks, but they mostly suffer from high overhead. In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead.
منابع مشابه
An Energy Efficient Clustering Method using Bat Algorithm and Mobile Sink in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of sensor nodes with limited energy. Energy efficiency is an important issue in WSNs as the sensor nodes are deployed in rugged and non-care areas and consume a lot of energy to send data to the central station or sink if they want to communicate directly with the sink. Recently, the IEEE 802.15.4 protocol is employed as a low-power, low-cost, and low rat...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملSelf-protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks
With the growing Information Systems and Network technologies, security threats over the systems have also become common. Providing a security mechanism to detect such threats has become an inevitable part of Information Systems. Distributed Denial of Service (DDoS) attack is one of the most common attacks which are done in a co-ordinated manner. Hence, we need a Distributed Intrusion Detection...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014