SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 7
EFFICIENT DISTRIBUTED DETECTION OF NODE REPLICATION
ATTACKS IN MOBILE SENSOR NETWORKS
Balaji.N1
, Anitha.M2
1
Department of Computer & Communication Engineering M.A.M College of Engineering, Tamilnadu, India
2
Department of Information &Technology Engineering M.A.M College of Engineering, Tamilnadu, India
Abstract
Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. Detecting and monitor of the
node is very difficult in distributed network and form a node replication attacks in a mobile sensor network .To detect the node
replication attacks in mobile sensor networks using two localized algorithms, XED and EDD. Our proposed algorithm can resist node
replication attacks in a localized fashion. Note that, the Nodes only need to do a distributed algorithm, task without the intervention of
the base station. The techniques developed in our solutions are to challenge and response and encounter number, are fundamentally
different from the others. Moreover, while most of the existing schemes in static networks rely on the witness finding strategy is cannot
be applied to mobile sensor networks, the velocity exceeding strategy used in existing schemes in mobile networks incurs efficiency
and more no security problems. Therefore, based on our node replication challenge and response to encounter number approaches in
localized algorithms are proposed to resist node replication attacks in mobile sensor networks. The advantage of our proposed
algorithm include 1) Localized detection; 2) Efficiency and effectiveness; 3) Network-wide synchronization avoidance; 4) Network-
wide revocation avoidance Performance comparisons with known methods are provided to demonstrate the efficiency of our proposed
algorithms.
Keywords: Mobile Sensor Network, Attack, node replication attack, static and mobile WSN.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Recent researches Wireless communication and portable
computers with two or more mobile nodes already issued a
temporary network without the use of network infrastructure
or centralized management of the sensor mobile network you
can create . That led to a new concept [1]. Source and
destination mobile node to communicate with each other, if
not within the scope of the data packets to the mobile parts [2],
which is between the relaying transmissions through other
mobile hosts in the mobile host is not allowed to do. Here, in
no special infrastructure such as military and rescue affairs in
various fields, many applications developed for mobile
networks are expected to be required. A sensor node, the node
captured from the same identity (ID) number of copies of the
lead, and malicious activities, and strategic levels of the
network makes the replicas. This is a so -called node
replication attacks. Each node in a sensor network is free to
move freely in any direction. Cellular system is rather a master
-slave relationship.
Fig.1 Node Replication Attack
This temporary access to data networks is less than that of
conventional fixed networks. Hope is not a viable solution for
the owner of the original data, the data items that went into the
mobile area. A voting mechanism, using neighbors ' can reach
consensus on a legal point [3].Unfortunately, when you reach
a distributed fashion innovation, disjoint parts distribution
network response time to discover the identity of the node .At
least when nodes to replicate two hops from each other, the
local approach can detect the replicated node in a network.
When reproducing at least two hops away from each other at
the ends, you can find a local approach with the tip of a
network.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 8
1.1Wormhole Attack
In wormhole attack, a malicious node adversary receives
packets at one location in the network and tunnels them to
another location in the network, then that packets are resent
into the network, this tunnel between two colluding attackers
is called wormhole.
1.2 Black Hole Attack
This attack will flood of demand -based protocol to say it all.
In this attack, the attack will create a very narrow path in
response to a node receives a route request. The real answer is
that a malicious node will start from the front edge of the
answer, and then created a false path. [5] Malicious
communication between nodes can be added to the device
itself, it is the ability to move between them for misbehavior.
Interfere will carry the node with proper operation of the
network routing protocol and the number of attacks mounted.
1.3 Routing Table Overflow
In the case of overflow routing table, routing table overflow,
the causes are not nodes. Novel routes to avoid the creation or
implementation of the protocol were enough to overwhelm the
need to create routes. Proactive routing algorithms, routing
information before it needs to be found. It only needs to find a
way to process the reaction becomes mandatory. Toxic
poisoning routing node
1.4 Node Routing Poisoning
The node routing network nodes compromised. Other
authorized end up sending the actual routing of packets to
send updates or updates of any change [6]. Routing table
poisoning will provided caused by sub-optimal routing.
Traffic congestion in the network [7], or access the network
set up in a few areas. This invention uses the pseudo- demand
routing the attack can launch the attack. So before the request
packet is received by the legal way to receive and reject those
packets that the nodes
1.5Rushing Attack
On-demand routing protocol which use duplicate during the
route innovation process are vulnerable to this attack. An
attacker which receives a route request packet from the initiate
node flood the packet rapidly throughput the network before
further nodes which also receive the same route request packet
can respond. Nodes that receive the lawful route request
packet previously received through the attacker and hence
discard those packets.
1.6 Identification of Problem
Sensor networks, which are composed of a number of sensor
nodes with limited resources, have been demonstrated to be
useful in applications, such as environment monitoring [8] and
object tracking [9]. As sensor networks could be deployed in a
hostile region to perform critical missions, the sensor networks
are unattended and the sensor nodes normally are not equipped
with tamper-resistant hardware [7]. This allows a situation
where the adversary can compromise one sensor node,
fabricate many replicas having the same identity (ID) from the
captured node, and place these replicas back into strategic
positions in the network for further malicious activities. This
is also-called node replication attack. Since the credentials of
replicas are all clones of the captured nodes, the replicas can
be considered as legitimate members of the network, making
detection difficult. From the security point of view, the node
replication attack is extremely harmful to networks because
replicas, having keys, can easily launch insider attacks,
without easily being detected.
2. RELATED WORKS
The first detection of node replication attacks solutions relies
on a centralized base station WORKS. In this solution, each
node is a base station (BS), its neighbors and sends a list of
suggested places [3] .the “Close" to each other, the two lists
are sent to the nodes that do not result in the entry clone
detection. Then, BS becomes clones. This solution has several
drawbacks in the presence of a single point of failure BS, and
communication costs are high due to the large number of
messages. Also, BS so close to the edges of their operational
life is shorter than the other nodes to route messages. Finding
other solutions remains local. For example, a voting
mechanism for a particular node [10] is used in a near -term
adoption. These kinds of node will the same location, the false
detection problem, if you cannot find. Node replication attacks
described finding the solution to a naive point of distribution
network broadcast. . The solution for the network was flooded
by comparing the location information. Each node in a
network containing information about the location neighbor
found a tip of the nozzle is in a position corresponding to the
position that enjoys a location claim; this will result in clone
detection. The WSN nodes and the number of iteration, the N
flooded However, this process is very energy consuming.
Sybil attack, a node will be deleted from the ends of a number
of stolen identities says. Identity theft is on the chip and clone
attacks that are based on the reference; however, angles two
attacks [11] are available. They are effectively addressed RSSI
or authentication mechanism based on a fixed key knowledge.
They are efficiently addressed mechanism for RSSI or with
authentication Based on the knowledge of a fixed key set for
efficient detection of clone attacks is actually an open issue.
To the best of our knowledge the first non naïve, globally-
aware and distributed node-replication detection solution was
recently proposed [12]. In particular, two distributed detection
protocols with emergent properties were proposed. The first
one, the Randomized Multicast (RM) [13], distributes node
location information to randomly-selected nodes. The second
one, the Line-Selected Multicast (LSM), uses the routing
topology of the network to detect replication. In the RM, when
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 9
a node broadcasts its location, each of its neighbours sends a
digitally signed copy of the location claim to a set of randomly
selected nodes. Assuming there is a replicated node, if every
neighbour randomly selects O (√n) destinations, then
exploiting the birthday paradox. There is a non negligible
probability at least one node will receive a pair of non
coherent location claims. The node that detects the existence
of another node in two different locations within the same
time-frame will be called witness.
The RM protocol implies high communication costs: Each
neighbour has to send O (√n) messages. To solve this problem
the authors propose using the LSM protocol [14]. The LSM
protocol behaviour is similar to that of RM but introduces a
minor modification that implies a noticeable improvement in
terms of detection probability. Node replication is eventually
detected by the node (called witness) on the intersection of
two paths that originate from different network positions by
the same node ID [15], [16], In fact, during a check the same
node y0 is present with two non-coherent locations; the
Witness will trigger a revocation protocol for node y0.
3. PROPOSED SYSTEM
To detect the replicas node in mobile sensor networks using
two algorithms, XED and EDD, are proposed. The proposed
techniques developed a solutions for a replica attack,
challenge-and-response and encounter-number, are
fundamentally different from the others. The proposed
algorithm can resist node replication attacks in a localized
fashion. Compared to the distributed algorithm, nodes perform
the task without the intervention of the base station. The
localized algorithm is a particular type of distributed
algorithm. Each node in the localized algorithm can
communicate with only its one-hop neighbors’. This
characteristic is helpful in reducing the communication
overhead significantly and enhancing the resilience against
node compromise. The algorithm can identify replicas with
high detection accuracy. The revocation of the replicas can be
performed by each node without flooding the entire network
with the revocation messages. The time of nodes in the
network does not need to be synchronized.
3.1 Target Localization Problem
Such as environmental monitoring and multi- sensor target
tracking sensor network applications, plays a key role.
Wireless sensor networks based on techniques developed in
places like the tip of a sensor based on the location
information in routing decisions need to shout . Beacon nodes
to use some special nodes to be considered in their own places
of ethics / prediction methods, innovation, and more than
location. These algorithms work in two steps. The first step:
Non lighthouse beacon nodes to nodes that receive messages
from the radio signals. The message includes a reference to the
location of the beacon node. Second Step will provide non
lighthouse beacon and non- beacon nodes, for example, the
distance between the nodes, perform some specific
measurements. And the arrival time difference between the
received signal strength measurements in terms of the
messages. Without protection, an attacker can easily spoil and
normal operation of the sensor nodes for location estimation of
sensor networks to be carried out. In different places, running
in the wrong place can offer tips to prevent an attack beacon
packets. Also, an attacker manipulating and lying about the
location of a lighthouse or beacon signals may be
compromised to distribute malicious location references.
Beacon signals. In one case, the non- beacon nodes to
determine their locations wrong. From the point of view of
security and connection dimensions of the problem has been
studied intensely in recent years. The most common problem
with a sensor area of security issues in the sensitive area of a
circular disk model assumes that it is cantered. At one point he
is said to be in the sensing area.
4. DETECTON TECHNIQUE OVER MOBILE
SENSOR NETWORK
In this paper, a defense mechanism against replication attacks
is proposed in mobile sensor networks .In this technique;
multiple paths are established between source and destination
for data transmission using XED and EDD for optimization. In
the elected routes, the nodes with highest trust value, residual
bandwidth and residual energy are elected as active nodes by
using ant agents. Every active node monitors its neighbor
nodes within its transmission region and collects the trust of
all monitored node. The active nodes adaptively change as per
the trust thresholds.
Fig.2 Architecture of mobile sensor network
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 10
4.1 Detection System
In this paper detection -based security scheme provided for
mobile sensor network. Although mobile sensor network is
less computation and communication skills, as they continue
to permit the detection of anomalies in network nodes with
specific characteristics of the neighborhood information. We
show that the properties as key enablers to be used in large-
scale sensor networks security. In many attacks against mobile
sensor networks, initially as a legitimate node within the
network it has to do with the attack. Near the edges of a
simple dynamic statistical model of the received packet power
levels and lower risk by monitoring the arrival of a sensor
capable of detecting intruder detection built in conjunction
with the protocol to create nose in the networking nodes. We
show that such characteristics can be exploited as key enablers
for given that the security to large scale sensor networks. In
many attacks against Mobile sensor networks, initially
attacker is to make itself as a legitimate node within the
network. To create a sensor nose capable of detecting an
intruder a simple dynamic statistical model of the adjacent
nodes is built in conjunction with a low complication detection
algorithm by monitoring received packet power levels and
arrival rates
4.2 Node Deployment
Each node requests our node deployment to the base station at
the time of deployment. After requesting, Node details are
verified and save accordingly. Details include Node-Id, IP-
Address and Port Number. Base station captures the node
position and also save the node current position. Base station
updates node position as per the node movement. Base station
monitors the entire network and updates its position as per the
movement.
4.3Execute Offline Step
In this module execute our proposed algorithm’s Offline steps.
Our algorithm generates the secret key and saves accordingly.
The current node maintains other node’s given secret key at
the time of meet past interaction. Current node maintains the
block list also. The block list consist of replicated node details
are stored.
4.4 Find Next Hop and Candidate Hop
Based on sensor node’s geographic position and source node’s
(Main system) geographic position prepare the neighbor list to
avoid opposite direction nodes. Neighbor list consist of current
coverage’s all the node. Prepare next hop and candidate list
based on the neighbor list. Next hop is selected from neighbor
list based on the source node nearby hop balanced node is add
candidate list. The candidate list is used when current next hop
is any problem (For example at the time of replication
detection next hop is any problem furthermore candidate list is
considerable.) the next priority is given to candidate hop. If
more than one candidate is available the higher priority is goes
to nearby source node position.
4.5 Localized Detection
After getting next hop name, execute our proposed algorithm’s
online steps. In that algorithm first check next hop is source
node or not, if yes object will directly forward to source node.
Otherwise check current node meet already the next hop or
not, if yes request the secret key given during previous
interaction. Current hop check the received secret key is
matching to previously given. If yes, then current node made
communication to next hop and replace the existing secret key
in next hop otherwise it is replicated node. The current next
hop name is added to the current sensor nodes block list.
4.6 Eliminate Replicated Hop
In localized detection find any replicated node to eliminate
current hop and select another next hop from candidate list.
Again execute our proposed algorithm. This process is made
up to get original hop
5. PERFORMANCE METRICS
The performance is evaluated according to the following
metrics for node reapplication attack in mobile sensor
network. This can evaluate a dictions performance in easy
manner
Table1: Detection Mechanisms for performance overheads
6. MATHEMATICAL MODEL
Step 1: Let us consider in WSN with node, witness node set
&neighbour.
Where,
x = Number of nodes in the network
p = probability a neighbour replicates location information
z = Number of witness nodes
Step2: Probability of selected witness node is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 11
(1-z) (1)
Step3: The attack is detected is equal to the probability that at
least one neighbour of each clone sends the claim to the same
witnesses.
(1-(1-z) ^x)^2 (2)
Step4: The evaluation of protocol is done based on energy
consumption, memory overhead, detection probability by
using below equation
(O (p .z .x) (3)
Chart -1.Comparison of protocols
7. CONCLUSIONS
The Replica Detection Algorithms for mobile sensor
networks, XED and EDD, are proposed. Although XED is not
resilient against collusive replicas, its detection framework,
challenge-and-response, is considered novel as compared with
the existing algorithms. Notably, with the novel encounter-
number detection approach, which is fundamentally different
from those used in the existing algorithms, EDD not only
achieves balance among storage, computation, and
communication overheads, which are all, but also possesses
unique characteristics, including network-wide time
synchronization avoidance and network-wide revocation
avoidance, in the detection of node replication attacks. This
method improves the security aspect of wireless sensor
networks mainly in unattended environment and improves the
real time data acquisition systems in future.
REFERENCES
[1] R. Brooks, P. Y. Govindaraju, M. Pirretti, N.
Vijaykrishnan, and M.T. Kandemir, “On the detection
of clones in sensor networks using random key
predistribution,” IEEE Trans. Syst., Man, Cybern. C,
Applicat. Rev., vol. 37, no. 6, pp. 1246–1258, Nov.
2007.
[2] M. Conti, R.Di Pietro, L. V. Mancini, andA.Mei,
“Arandomized, efficient, and distributed protocol for
the detection of node replication attacks in wireless
sensor networks,” in Proc. ACMInt. Symp. Mobile Ad
Hoc Networking and Computing (MobiHoc), Montreal,
Canada, 2007, pp. 80–89.
[3] J. Ho,M.Wright, and S. K. Das, “Fast detection of
replica node attacks in mobile sensor networks using
sequential analysis,” in Proc. IEEE Int. Conf.
Computer Communications (INFOCOM), Brazil, 2009,
pp.1773–1781.
[4] B. Parno, A. Perrig, V. Gligor, “Distributed detection
of node replication attacks in sensor networks,” in
Proc. IEEE Symp. Security and Privacy (S&P),
Oakland, CA, USA, 2005, pp. 49–63.
[5] K. Xing and X. Cheng, “From time domain to space
domain: Detecting replica attacks in mobile ad hoc
networks,” in Proc. IEEE Int. Conf. Computer
Communications (INFOCOM), SanDiego,CA, USA,
2010, pp. 1–9.
[6] C.-M. Yu, C.-S. Lu and S.-Y. Kuo, “Mobile sensor
network resilient against node replication attacks,” in
Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc
Communications and Networks (SECON), California,
USA, 2008, pp. 597–599, (poster).
[7] C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Efficient and
distributed detection of node replication attacks in
mobile sensor networks,” in Proc. IEEE Vehicular
Technology Conf. Fall (VTC-Fall), Anchorage, AK,
USA, 2009, pp. 1–5.
[8] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang,
“Localized multicast: Efficient and distributed replica
detection in large-scale sensor networks,” IEEE Trans.
Mobile Comput., vol. 9, no. 7, pp. 913–926, Jul. 2010.
[9] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie,
“Random-walk based approach to detect clone attacks
in wireless sensor networks,” IEEE J. Sel. Areas
Commun., vol. 28, no. 5, pp. 677–691, Jun. 2010.
[10] M.Zhang, V. Khanapure, S. Chen, and X. Xiao,
“Memory efficient protocols for detecting node
replication attacks in wireless sensor networks,” in
Proc. IEEE Int. Conf. Network Protocols (ICNP),
Princeton, NJ, USA, 2009, pp. 284–293.
[11] R. A. Johnson and D. W. Wichern, Applied
Multivariate Statistical Analysis. Englewood Cliffs, NJ,
USA: Prentice-Hall, 2007.
[12] T. Karagiannis, J. L. Boudec, and M. Vojnovic,
“Power law and exponential decay of inter contact
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 12
times between mobile devices,” in Proc. ACM Int.
Conf. Mobile Computing and Networking (MobiCom),
Montreal, Canada, 2007, pp. 183–194.
[13] M. Luk, G. Mezzour, A. Perrig, and V. Gligor,
“MiniSec: A securesensor network communication
architecture,” in Proc. Int. Conf. Information
Processing in Sensor Networks (IPSN),
Cambridge,MA, USA, 2007.
[14] Liu and P. Ning, “TinyECC: A configurable library for
elliptic curvecryptography in wireless sensor
networks,” in Proc. Int. Conf. Information Processing
in Sensor Networks (IPSN), Missouri, USA, 2008,
pp.245–256.
[15] D. J. Malan, M. Welsh, and M. D. Smith,
“Implementing public-key infrastructure for sensor
networks,” ACM Trans. Sensor Network, vol. 4, no. 4,
pp. 1–23, 2008
[16] J. Newsome, E. Shi, D. Song, and A. Perrig, “The
Sybil attack in sensor networks: Analysis and
defenses,” in Proc. Int. Conf. Information Processing
in Sensor Networks (IPSN), Berkeley, CA, USA, 2004,
pp. 259–268
BIOGRAPHIES
N.BALAJI received B.E.-Computer
science Engineering (2012) from j.j.
college of engineering and Technology,
Trichy ,Tamil Nadu, India under Anna
University and M.E. in Computer and
Communication Engineering (2014) from
Anna University, M.A.M College Of Engineering, Trichy,
India. Her current research area is Wireless Sensor Network
Security.
Ms.M.Anitha is an Assistant Professor in
the Department of information technology
at M.A.M College Of Engineering, Trichy,
India. She received his B.E. in computer
Sciences and Engineering from A.R.J
College of Engineering & Technology,
Mannargudi. Anna University Tamil Nadu, India. In
2011 and She received his M.Tech in Advanced Computing
from SASTRA University Tamil Nadu, India in 2013.

More Related Content

What's hot

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 

What's hot (20)

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 

Viewers also liked

Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageeSAT Publishing House
 
Energy saving model and application for smart phones
Energy saving model and application for smart phonesEnergy saving model and application for smart phones
Energy saving model and application for smart phoneseSAT Publishing House
 
Reconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageReconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageeSAT Publishing House
 
Study of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soilStudy of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soileSAT Publishing House
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofeSAT Publishing House
 
Singularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialSingularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialeSAT Publishing House
 
Evaluation of reactances and time constants of synchronous generator
Evaluation of reactances and time constants of synchronous generatorEvaluation of reactances and time constants of synchronous generator
Evaluation of reactances and time constants of synchronous generatoreSAT Publishing House
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Prediction of flow characteristics through a
Prediction of flow characteristics through aPrediction of flow characteristics through a
Prediction of flow characteristics through aeSAT Publishing House
 
Design and development of a linear variable
Design and development of a linear variableDesign and development of a linear variable
Design and development of a linear variableeSAT Publishing House
 
Mri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heartMri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole hearteSAT Publishing House
 
Economic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyEconomic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyeSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseeSAT Publishing House
 
Radiation pattern of yagi uda antenna using usrp on gnu
Radiation pattern of yagi uda antenna using usrp on gnuRadiation pattern of yagi uda antenna using usrp on gnu
Radiation pattern of yagi uda antenna using usrp on gnueSAT Publishing House
 
Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...eSAT Publishing House
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewatereSAT Publishing House
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Publishing House
 

Viewers also liked (20)

Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor image
 
Energy saving model and application for smart phones
Energy saving model and application for smart phonesEnergy saving model and application for smart phones
Energy saving model and application for smart phones
 
Reconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageReconstruction of partially damaged facial image
Reconstruction of partially damaged facial image
 
Embedded wrist watch
Embedded wrist watchEmbedded wrist watch
Embedded wrist watch
 
Study of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soilStudy of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soil
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
 
Singularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialSingularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serial
 
Evaluation of reactances and time constants of synchronous generator
Evaluation of reactances and time constants of synchronous generatorEvaluation of reactances and time constants of synchronous generator
Evaluation of reactances and time constants of synchronous generator
 
Kinematic model of a car
Kinematic model of a carKinematic model of a car
Kinematic model of a car
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Prediction of flow characteristics through a
Prediction of flow characteristics through aPrediction of flow characteristics through a
Prediction of flow characteristics through a
 
Design and development of a linear variable
Design and development of a linear variableDesign and development of a linear variable
Design and development of a linear variable
 
Mri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heartMri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heart
 
Economic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyEconomic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case study
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylase
 
Radiation pattern of yagi uda antenna using usrp on gnu
Radiation pattern of yagi uda antenna using usrp on gnuRadiation pattern of yagi uda antenna using usrp on gnu
Radiation pattern of yagi uda antenna using usrp on gnu
 
Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewater
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 

Similar to Efficient distributed detection of node replication attacks in mobile sensor networks

A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkIISRT
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 

Similar to Efficient distributed detection of node replication attacks in mobile sensor networks (20)

A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
C0511318
C0511318C0511318
C0511318
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Efficient distributed detection of node replication attacks in mobile sensor networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 7 EFFICIENT DISTRIBUTED DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS Balaji.N1 , Anitha.M2 1 Department of Computer & Communication Engineering M.A.M College of Engineering, Tamilnadu, India 2 Department of Information &Technology Engineering M.A.M College of Engineering, Tamilnadu, India Abstract Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. Detecting and monitor of the node is very difficult in distributed network and form a node replication attacks in a mobile sensor network .To detect the node replication attacks in mobile sensor networks using two localized algorithms, XED and EDD. Our proposed algorithm can resist node replication attacks in a localized fashion. Note that, the Nodes only need to do a distributed algorithm, task without the intervention of the base station. The techniques developed in our solutions are to challenge and response and encounter number, are fundamentally different from the others. Moreover, while most of the existing schemes in static networks rely on the witness finding strategy is cannot be applied to mobile sensor networks, the velocity exceeding strategy used in existing schemes in mobile networks incurs efficiency and more no security problems. Therefore, based on our node replication challenge and response to encounter number approaches in localized algorithms are proposed to resist node replication attacks in mobile sensor networks. The advantage of our proposed algorithm include 1) Localized detection; 2) Efficiency and effectiveness; 3) Network-wide synchronization avoidance; 4) Network- wide revocation avoidance Performance comparisons with known methods are provided to demonstrate the efficiency of our proposed algorithms. Keywords: Mobile Sensor Network, Attack, node replication attack, static and mobile WSN. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Recent researches Wireless communication and portable computers with two or more mobile nodes already issued a temporary network without the use of network infrastructure or centralized management of the sensor mobile network you can create . That led to a new concept [1]. Source and destination mobile node to communicate with each other, if not within the scope of the data packets to the mobile parts [2], which is between the relaying transmissions through other mobile hosts in the mobile host is not allowed to do. Here, in no special infrastructure such as military and rescue affairs in various fields, many applications developed for mobile networks are expected to be required. A sensor node, the node captured from the same identity (ID) number of copies of the lead, and malicious activities, and strategic levels of the network makes the replicas. This is a so -called node replication attacks. Each node in a sensor network is free to move freely in any direction. Cellular system is rather a master -slave relationship. Fig.1 Node Replication Attack This temporary access to data networks is less than that of conventional fixed networks. Hope is not a viable solution for the owner of the original data, the data items that went into the mobile area. A voting mechanism, using neighbors ' can reach consensus on a legal point [3].Unfortunately, when you reach a distributed fashion innovation, disjoint parts distribution network response time to discover the identity of the node .At least when nodes to replicate two hops from each other, the local approach can detect the replicated node in a network. When reproducing at least two hops away from each other at the ends, you can find a local approach with the tip of a network.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 8 1.1Wormhole Attack In wormhole attack, a malicious node adversary receives packets at one location in the network and tunnels them to another location in the network, then that packets are resent into the network, this tunnel between two colluding attackers is called wormhole. 1.2 Black Hole Attack This attack will flood of demand -based protocol to say it all. In this attack, the attack will create a very narrow path in response to a node receives a route request. The real answer is that a malicious node will start from the front edge of the answer, and then created a false path. [5] Malicious communication between nodes can be added to the device itself, it is the ability to move between them for misbehavior. Interfere will carry the node with proper operation of the network routing protocol and the number of attacks mounted. 1.3 Routing Table Overflow In the case of overflow routing table, routing table overflow, the causes are not nodes. Novel routes to avoid the creation or implementation of the protocol were enough to overwhelm the need to create routes. Proactive routing algorithms, routing information before it needs to be found. It only needs to find a way to process the reaction becomes mandatory. Toxic poisoning routing node 1.4 Node Routing Poisoning The node routing network nodes compromised. Other authorized end up sending the actual routing of packets to send updates or updates of any change [6]. Routing table poisoning will provided caused by sub-optimal routing. Traffic congestion in the network [7], or access the network set up in a few areas. This invention uses the pseudo- demand routing the attack can launch the attack. So before the request packet is received by the legal way to receive and reject those packets that the nodes 1.5Rushing Attack On-demand routing protocol which use duplicate during the route innovation process are vulnerable to this attack. An attacker which receives a route request packet from the initiate node flood the packet rapidly throughput the network before further nodes which also receive the same route request packet can respond. Nodes that receive the lawful route request packet previously received through the attacker and hence discard those packets. 1.6 Identification of Problem Sensor networks, which are composed of a number of sensor nodes with limited resources, have been demonstrated to be useful in applications, such as environment monitoring [8] and object tracking [9]. As sensor networks could be deployed in a hostile region to perform critical missions, the sensor networks are unattended and the sensor nodes normally are not equipped with tamper-resistant hardware [7]. This allows a situation where the adversary can compromise one sensor node, fabricate many replicas having the same identity (ID) from the captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is also-called node replication attack. Since the credentials of replicas are all clones of the captured nodes, the replicas can be considered as legitimate members of the network, making detection difficult. From the security point of view, the node replication attack is extremely harmful to networks because replicas, having keys, can easily launch insider attacks, without easily being detected. 2. RELATED WORKS The first detection of node replication attacks solutions relies on a centralized base station WORKS. In this solution, each node is a base station (BS), its neighbors and sends a list of suggested places [3] .the “Close" to each other, the two lists are sent to the nodes that do not result in the entry clone detection. Then, BS becomes clones. This solution has several drawbacks in the presence of a single point of failure BS, and communication costs are high due to the large number of messages. Also, BS so close to the edges of their operational life is shorter than the other nodes to route messages. Finding other solutions remains local. For example, a voting mechanism for a particular node [10] is used in a near -term adoption. These kinds of node will the same location, the false detection problem, if you cannot find. Node replication attacks described finding the solution to a naive point of distribution network broadcast. . The solution for the network was flooded by comparing the location information. Each node in a network containing information about the location neighbor found a tip of the nozzle is in a position corresponding to the position that enjoys a location claim; this will result in clone detection. The WSN nodes and the number of iteration, the N flooded However, this process is very energy consuming. Sybil attack, a node will be deleted from the ends of a number of stolen identities says. Identity theft is on the chip and clone attacks that are based on the reference; however, angles two attacks [11] are available. They are effectively addressed RSSI or authentication mechanism based on a fixed key knowledge. They are efficiently addressed mechanism for RSSI or with authentication Based on the knowledge of a fixed key set for efficient detection of clone attacks is actually an open issue. To the best of our knowledge the first non naïve, globally- aware and distributed node-replication detection solution was recently proposed [12]. In particular, two distributed detection protocols with emergent properties were proposed. The first one, the Randomized Multicast (RM) [13], distributes node location information to randomly-selected nodes. The second one, the Line-Selected Multicast (LSM), uses the routing topology of the network to detect replication. In the RM, when
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 9 a node broadcasts its location, each of its neighbours sends a digitally signed copy of the location claim to a set of randomly selected nodes. Assuming there is a replicated node, if every neighbour randomly selects O (√n) destinations, then exploiting the birthday paradox. There is a non negligible probability at least one node will receive a pair of non coherent location claims. The node that detects the existence of another node in two different locations within the same time-frame will be called witness. The RM protocol implies high communication costs: Each neighbour has to send O (√n) messages. To solve this problem the authors propose using the LSM protocol [14]. The LSM protocol behaviour is similar to that of RM but introduces a minor modification that implies a noticeable improvement in terms of detection probability. Node replication is eventually detected by the node (called witness) on the intersection of two paths that originate from different network positions by the same node ID [15], [16], In fact, during a check the same node y0 is present with two non-coherent locations; the Witness will trigger a revocation protocol for node y0. 3. PROPOSED SYSTEM To detect the replicas node in mobile sensor networks using two algorithms, XED and EDD, are proposed. The proposed techniques developed a solutions for a replica attack, challenge-and-response and encounter-number, are fundamentally different from the others. The proposed algorithm can resist node replication attacks in a localized fashion. Compared to the distributed algorithm, nodes perform the task without the intervention of the base station. The localized algorithm is a particular type of distributed algorithm. Each node in the localized algorithm can communicate with only its one-hop neighbors’. This characteristic is helpful in reducing the communication overhead significantly and enhancing the resilience against node compromise. The algorithm can identify replicas with high detection accuracy. The revocation of the replicas can be performed by each node without flooding the entire network with the revocation messages. The time of nodes in the network does not need to be synchronized. 3.1 Target Localization Problem Such as environmental monitoring and multi- sensor target tracking sensor network applications, plays a key role. Wireless sensor networks based on techniques developed in places like the tip of a sensor based on the location information in routing decisions need to shout . Beacon nodes to use some special nodes to be considered in their own places of ethics / prediction methods, innovation, and more than location. These algorithms work in two steps. The first step: Non lighthouse beacon nodes to nodes that receive messages from the radio signals. The message includes a reference to the location of the beacon node. Second Step will provide non lighthouse beacon and non- beacon nodes, for example, the distance between the nodes, perform some specific measurements. And the arrival time difference between the received signal strength measurements in terms of the messages. Without protection, an attacker can easily spoil and normal operation of the sensor nodes for location estimation of sensor networks to be carried out. In different places, running in the wrong place can offer tips to prevent an attack beacon packets. Also, an attacker manipulating and lying about the location of a lighthouse or beacon signals may be compromised to distribute malicious location references. Beacon signals. In one case, the non- beacon nodes to determine their locations wrong. From the point of view of security and connection dimensions of the problem has been studied intensely in recent years. The most common problem with a sensor area of security issues in the sensitive area of a circular disk model assumes that it is cantered. At one point he is said to be in the sensing area. 4. DETECTON TECHNIQUE OVER MOBILE SENSOR NETWORK In this paper, a defense mechanism against replication attacks is proposed in mobile sensor networks .In this technique; multiple paths are established between source and destination for data transmission using XED and EDD for optimization. In the elected routes, the nodes with highest trust value, residual bandwidth and residual energy are elected as active nodes by using ant agents. Every active node monitors its neighbor nodes within its transmission region and collects the trust of all monitored node. The active nodes adaptively change as per the trust thresholds. Fig.2 Architecture of mobile sensor network
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 10 4.1 Detection System In this paper detection -based security scheme provided for mobile sensor network. Although mobile sensor network is less computation and communication skills, as they continue to permit the detection of anomalies in network nodes with specific characteristics of the neighborhood information. We show that the properties as key enablers to be used in large- scale sensor networks security. In many attacks against mobile sensor networks, initially as a legitimate node within the network it has to do with the attack. Near the edges of a simple dynamic statistical model of the received packet power levels and lower risk by monitoring the arrival of a sensor capable of detecting intruder detection built in conjunction with the protocol to create nose in the networking nodes. We show that such characteristics can be exploited as key enablers for given that the security to large scale sensor networks. In many attacks against Mobile sensor networks, initially attacker is to make itself as a legitimate node within the network. To create a sensor nose capable of detecting an intruder a simple dynamic statistical model of the adjacent nodes is built in conjunction with a low complication detection algorithm by monitoring received packet power levels and arrival rates 4.2 Node Deployment Each node requests our node deployment to the base station at the time of deployment. After requesting, Node details are verified and save accordingly. Details include Node-Id, IP- Address and Port Number. Base station captures the node position and also save the node current position. Base station updates node position as per the node movement. Base station monitors the entire network and updates its position as per the movement. 4.3Execute Offline Step In this module execute our proposed algorithm’s Offline steps. Our algorithm generates the secret key and saves accordingly. The current node maintains other node’s given secret key at the time of meet past interaction. Current node maintains the block list also. The block list consist of replicated node details are stored. 4.4 Find Next Hop and Candidate Hop Based on sensor node’s geographic position and source node’s (Main system) geographic position prepare the neighbor list to avoid opposite direction nodes. Neighbor list consist of current coverage’s all the node. Prepare next hop and candidate list based on the neighbor list. Next hop is selected from neighbor list based on the source node nearby hop balanced node is add candidate list. The candidate list is used when current next hop is any problem (For example at the time of replication detection next hop is any problem furthermore candidate list is considerable.) the next priority is given to candidate hop. If more than one candidate is available the higher priority is goes to nearby source node position. 4.5 Localized Detection After getting next hop name, execute our proposed algorithm’s online steps. In that algorithm first check next hop is source node or not, if yes object will directly forward to source node. Otherwise check current node meet already the next hop or not, if yes request the secret key given during previous interaction. Current hop check the received secret key is matching to previously given. If yes, then current node made communication to next hop and replace the existing secret key in next hop otherwise it is replicated node. The current next hop name is added to the current sensor nodes block list. 4.6 Eliminate Replicated Hop In localized detection find any replicated node to eliminate current hop and select another next hop from candidate list. Again execute our proposed algorithm. This process is made up to get original hop 5. PERFORMANCE METRICS The performance is evaluated according to the following metrics for node reapplication attack in mobile sensor network. This can evaluate a dictions performance in easy manner Table1: Detection Mechanisms for performance overheads 6. MATHEMATICAL MODEL Step 1: Let us consider in WSN with node, witness node set &neighbour. Where, x = Number of nodes in the network p = probability a neighbour replicates location information z = Number of witness nodes Step2: Probability of selected witness node is
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 11 (1-z) (1) Step3: The attack is detected is equal to the probability that at least one neighbour of each clone sends the claim to the same witnesses. (1-(1-z) ^x)^2 (2) Step4: The evaluation of protocol is done based on energy consumption, memory overhead, detection probability by using below equation (O (p .z .x) (3) Chart -1.Comparison of protocols 7. CONCLUSIONS The Replica Detection Algorithms for mobile sensor networks, XED and EDD, are proposed. Although XED is not resilient against collusive replicas, its detection framework, challenge-and-response, is considered novel as compared with the existing algorithms. Notably, with the novel encounter- number detection approach, which is fundamentally different from those used in the existing algorithms, EDD not only achieves balance among storage, computation, and communication overheads, which are all, but also possesses unique characteristics, including network-wide time synchronization avoidance and network-wide revocation avoidance, in the detection of node replication attacks. This method improves the security aspect of wireless sensor networks mainly in unattended environment and improves the real time data acquisition systems in future. REFERENCES [1] R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the detection of clones in sensor networks using random key predistribution,” IEEE Trans. Syst., Man, Cybern. C, Applicat. Rev., vol. 37, no. 6, pp. 1246–1258, Nov. 2007. [2] M. Conti, R.Di Pietro, L. V. Mancini, andA.Mei, “Arandomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks,” in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, Canada, 2007, pp. 80–89. [3] J. Ho,M.Wright, and S. K. Das, “Fast detection of replica node attacks in mobile sensor networks using sequential analysis,” in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Brazil, 2009, pp.1773–1781. [4] B. Parno, A. Perrig, V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2005, pp. 49–63. [5] K. Xing and X. Cheng, “From time domain to space domain: Detecting replica attacks in mobile ad hoc networks,” in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, 2010, pp. 1–9. [6] C.-M. Yu, C.-S. Lu and S.-Y. Kuo, “Mobile sensor network resilient against node replication attacks,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 597–599, (poster). [7] C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Efficient and distributed detection of node replication attacks in mobile sensor networks,” in Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall), Anchorage, AK, USA, 2009, pp. 1–5. [8] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: Efficient and distributed replica detection in large-scale sensor networks,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913–926, Jul. 2010. [9] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, “Random-walk based approach to detect clone attacks in wireless sensor networks,” IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 677–691, Jun. 2010. [10] M.Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, 2009, pp. 284–293. [11] R. A. Johnson and D. W. Wichern, Applied Multivariate Statistical Analysis. Englewood Cliffs, NJ, USA: Prentice-Hall, 2007. [12] T. Karagiannis, J. L. Boudec, and M. Vojnovic, “Power law and exponential decay of inter contact
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 12 times between mobile devices,” in Proc. ACM Int. Conf. Mobile Computing and Networking (MobiCom), Montreal, Canada, 2007, pp. 183–194. [13] M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “MiniSec: A securesensor network communication architecture,” in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Cambridge,MA, USA, 2007. [14] Liu and P. Ning, “TinyECC: A configurable library for elliptic curvecryptography in wireless sensor networks,” in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Missouri, USA, 2008, pp.245–256. [15] D. J. Malan, M. Welsh, and M. D. Smith, “Implementing public-key infrastructure for sensor networks,” ACM Trans. Sensor Network, vol. 4, no. 4, pp. 1–23, 2008 [16] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis and defenses,” in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Berkeley, CA, USA, 2004, pp. 259–268 BIOGRAPHIES N.BALAJI received B.E.-Computer science Engineering (2012) from j.j. college of engineering and Technology, Trichy ,Tamil Nadu, India under Anna University and M.E. in Computer and Communication Engineering (2014) from Anna University, M.A.M College Of Engineering, Trichy, India. Her current research area is Wireless Sensor Network Security. Ms.M.Anitha is an Assistant Professor in the Department of information technology at M.A.M College Of Engineering, Trichy, India. She received his B.E. in computer Sciences and Engineering from A.R.J College of Engineering & Technology, Mannargudi. Anna University Tamil Nadu, India. In 2011 and She received his M.Tech in Advanced Computing from SASTRA University Tamil Nadu, India in 2013.