This document summarizes a research paper on defending against replication node attacks in wireless sensor networks. The paper proposes using a "Black Roll" technique to detect and block compromised nodes. It uses Sequential Probability Ratio Testing (SPRT) to detect if a node's speed exceeds the maximum, indicating replication. If detected, the node's IP is added to a blacklist table secured with RSA encryption. A tool called Protowall then blocks the IP address on the blacklist to prevent network access. The paper claims this Black Roll technique improves detection of replication node attacks compared to existing approaches.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
The document describes a label-based secure localization scheme against wormhole attacks in wireless sensor networks using DV-Hop localization. The scheme analyzes how wormhole attacks impact DV-Hop localization by reducing hop counts and contaminating average distance per hop calculations. It generates pseudo neighbor lists to classify attacked nodes, labels neighboring nodes, and prohibits communications with pseudo neighbors to remove wormhole-tunneled packets and achieve secure localization. Simulation results demonstrate the scheme can effectively detect wormhole attacks and resist their impacts.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
International Journal of Computational Engineering Research(IJCER) ijceronline
This document presents a keying protocol for wireless sensor networks that aims to reduce the storage requirements for symmetric keys. Each sensor needs to store (n+1)/2 keys, where n is the number of sensors, which is more efficient than the n-1 keys required by previous protocols. The protocol provides mutual authentication between sensors and secure data exchange using symmetric keys. It is shown to be resistant to impersonation and eavesdropping attacks while requiring minimal storage. The protocol's design, implementation, and evaluation results demonstrating its effectiveness are described.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
The document describes a label-based secure localization scheme against wormhole attacks in wireless sensor networks using DV-Hop localization. The scheme analyzes how wormhole attacks impact DV-Hop localization by reducing hop counts and contaminating average distance per hop calculations. It generates pseudo neighbor lists to classify attacked nodes, labels neighboring nodes, and prohibits communications with pseudo neighbors to remove wormhole-tunneled packets and achieve secure localization. Simulation results demonstrate the scheme can effectively detect wormhole attacks and resist their impacts.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
International Journal of Computational Engineering Research(IJCER) ijceronline
This document presents a keying protocol for wireless sensor networks that aims to reduce the storage requirements for symmetric keys. Each sensor needs to store (n+1)/2 keys, where n is the number of sensors, which is more efficient than the n-1 keys required by previous protocols. The protocol provides mutual authentication between sensors and secure data exchange using symmetric keys. It is shown to be resistant to impersonation and eavesdropping attacks while requiring minimal storage. The protocol's design, implementation, and evaluation results demonstrating its effectiveness are described.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
This document summarizes an incremental trust-based method for robust position identification in wireless sensor networks (WSNs). The method has two phases: 1) location estimation, where a sensor node broadcasts its ID and locators that receive it perform distance bounding to estimate the sensor's position using verifiable trilateration, based on a threshold trust evaluation of the locators; and 2) location verification, where a locator verifies a sensor's claimed position through distance bounding. The method aims to localize sensor nodes securely in the presence of attackers by leveraging distance bounding, trilateration, and an incremental trust model between sensors and locators.
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
This document discusses location verification in wireless sensor networks. It describes two categories of location verification: on-spot verification and in-region verification. On-spot verification checks if a sensor's estimated location matches its true location, while in-region verification checks if a sensor is located within an application-specific region. The document proposes two lightweight algorithms, GFM and GFT, for on-spot verification using neighborhood observations. It also describes a probabilistic algorithm to compute the confidence that a sensor is inside the verification region for in-region verification. The proposed verification system can effectively verify sensor locations without relying on specialized hardware or deployment knowledge, making it suitable for low-cost wireless sensor networks.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
Effects of Addition of Sprint, Strength and Agility Training On Cardiovascula...IOSR Journals
Abstract: To find training related physiological and cardiovascular changes and adaptations in field hockey
players, this interventional study was conducted with 30 male field hockey trainees (age: 15.7±1.55 years,
range: 13-20 years) undergoing training in preparation phase. In addition to the their usual routine of 2 hours
per day, 6 times a week of aerobic, anaerobic and skill training session of field hockey; a specialized additional
training of 2 hours per day- 3 times a week, consisting of sprint, strength-power and agility was incorporated in
the schedule. Selected variables measured before and after the 6 week training were compared with paired t
test. Upon analysis we found that lean body mass (LBM) of the participants showed significant improvement
(P<0.05)><0.05)><0.05) in the echocardiographic parameters – increase in left ventricular
posterior wall thickness, left ventricular ejection fraction; and decrease in left ventricular end-systolic volume.
However when these parameters were expressed relative to LBM, no significant change was seen. Left
ventricular end-diastolic diameter and volume, body weight and body mass index too did not change
significantly after the training. This 6 week specialized additional training resulted in improvement of body
composition and cardiovascular functions of the participants, indicating favorable physiological, morphological
and functional adaptations.
Key words: field hockey; physiological adaptations; sports physiology; body composition; echocardiography;
lean body mass.
Efficient Parallel Pruning of Associative Rules with Optimized SearchIOSR Journals
This document describes a proposed algorithm called Fuzzy Optimal Search Space Pruning (FOSSP) to improve the efficiency of association rule mining. FOSSP uses parallel pruning techniques to simultaneously mine large transactional datasets at different item set levels, reducing execution time. It generates candidate item sets based on relative item values and information requirements. Frequent item sets and strong association rules are then generated from the parallel pruned item levels based on minimum support and conditional probability. The algorithm aims to minimize candidate sets and maximize informative rules while reducing execution time for association rule mining.
The Advantages of Two Dimensional Techniques (2D) in Pituitary Adenoma TreatmentIOSR Journals
The purpose of the study is to evaluate the two dimensional dose distribution techniques in pituitary adenoma patient treatment in order to provide 2D dose coverage to the target volume while sparing organs at risk (OARs). The CT simulator was used to radiograph 300 patients of pituitary adenomas to conform 2D dose distribution planning inside the tumour bed , and its structures were delineated; including gross target volume (GTV), clinical target volume (CTV), and planning target volume (PTV)], as well as organs at risks (OARs) . Dose distribution analysis was edited to provide 2D dose coverage to the target while sparing organs at risk. The main results of the study were, 2D dose distribution plans increases the unnecessary dose to the critical organs according to their geographical location from the pituitary adenoma site, and the present study , concludes that when the tumour dose increases from 45 to 55 Gy there is a linear proportional increment of dose to the organs at risks, and when the dose is about 60 Gy in 2D, the increment of unnecessary dose to temporal lobe is 0.31 Gy, and to eye is0.34Gy, and to optic chiasm is 0.42 Gy respectively .New techniques, which will lessen the unnecessary dose to OARs, needed to be developed .
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
This document summarizes an incremental trust-based method for robust position identification in wireless sensor networks (WSNs). The method has two phases: 1) location estimation, where a sensor node broadcasts its ID and locators that receive it perform distance bounding to estimate the sensor's position using verifiable trilateration, based on a threshold trust evaluation of the locators; and 2) location verification, where a locator verifies a sensor's claimed position through distance bounding. The method aims to localize sensor nodes securely in the presence of attackers by leveraging distance bounding, trilateration, and an incremental trust model between sensors and locators.
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
This document discusses location verification in wireless sensor networks. It describes two categories of location verification: on-spot verification and in-region verification. On-spot verification checks if a sensor's estimated location matches its true location, while in-region verification checks if a sensor is located within an application-specific region. The document proposes two lightweight algorithms, GFM and GFT, for on-spot verification using neighborhood observations. It also describes a probabilistic algorithm to compute the confidence that a sensor is inside the verification region for in-region verification. The proposed verification system can effectively verify sensor locations without relying on specialized hardware or deployment knowledge, making it suitable for low-cost wireless sensor networks.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
Effects of Addition of Sprint, Strength and Agility Training On Cardiovascula...IOSR Journals
Abstract: To find training related physiological and cardiovascular changes and adaptations in field hockey
players, this interventional study was conducted with 30 male field hockey trainees (age: 15.7±1.55 years,
range: 13-20 years) undergoing training in preparation phase. In addition to the their usual routine of 2 hours
per day, 6 times a week of aerobic, anaerobic and skill training session of field hockey; a specialized additional
training of 2 hours per day- 3 times a week, consisting of sprint, strength-power and agility was incorporated in
the schedule. Selected variables measured before and after the 6 week training were compared with paired t
test. Upon analysis we found that lean body mass (LBM) of the participants showed significant improvement
(P<0.05)><0.05)><0.05) in the echocardiographic parameters – increase in left ventricular
posterior wall thickness, left ventricular ejection fraction; and decrease in left ventricular end-systolic volume.
However when these parameters were expressed relative to LBM, no significant change was seen. Left
ventricular end-diastolic diameter and volume, body weight and body mass index too did not change
significantly after the training. This 6 week specialized additional training resulted in improvement of body
composition and cardiovascular functions of the participants, indicating favorable physiological, morphological
and functional adaptations.
Key words: field hockey; physiological adaptations; sports physiology; body composition; echocardiography;
lean body mass.
Efficient Parallel Pruning of Associative Rules with Optimized SearchIOSR Journals
This document describes a proposed algorithm called Fuzzy Optimal Search Space Pruning (FOSSP) to improve the efficiency of association rule mining. FOSSP uses parallel pruning techniques to simultaneously mine large transactional datasets at different item set levels, reducing execution time. It generates candidate item sets based on relative item values and information requirements. Frequent item sets and strong association rules are then generated from the parallel pruned item levels based on minimum support and conditional probability. The algorithm aims to minimize candidate sets and maximize informative rules while reducing execution time for association rule mining.
The Advantages of Two Dimensional Techniques (2D) in Pituitary Adenoma TreatmentIOSR Journals
The purpose of the study is to evaluate the two dimensional dose distribution techniques in pituitary adenoma patient treatment in order to provide 2D dose coverage to the target volume while sparing organs at risk (OARs). The CT simulator was used to radiograph 300 patients of pituitary adenomas to conform 2D dose distribution planning inside the tumour bed , and its structures were delineated; including gross target volume (GTV), clinical target volume (CTV), and planning target volume (PTV)], as well as organs at risks (OARs) . Dose distribution analysis was edited to provide 2D dose coverage to the target while sparing organs at risk. The main results of the study were, 2D dose distribution plans increases the unnecessary dose to the critical organs according to their geographical location from the pituitary adenoma site, and the present study , concludes that when the tumour dose increases from 45 to 55 Gy there is a linear proportional increment of dose to the organs at risks, and when the dose is about 60 Gy in 2D, the increment of unnecessary dose to temporal lobe is 0.31 Gy, and to eye is0.34Gy, and to optic chiasm is 0.42 Gy respectively .New techniques, which will lessen the unnecessary dose to OARs, needed to be developed .
A Primer on Cointegration: Application to Nigerian Gross Domestic Product and...IOSR Journals
This document examines the relationship between gross domestic product (GDP) and exports (EXP) in Nigeria from 1970 to 2007 using cointegration analysis. Autocorrelation tests show that GDP and EXP are both non-stationary. Applying the Augmented Engle-Granger method reveals that regressing GDP on EXP produces a cointegrating relationship, not a spurious one. An error correction model indicates that while GDP and EXP have a long-term equilibrium relationship, GDP does not fully adjust to changes in EXP in the short run.
1. The document discusses the proof of the Riemann hypothesis, which states that all non-trivial zeros of the Riemann zeta function lie on the critical line with real part of 1/2.
2. It is shown that the Riemann zeta function can be expressed as a rational function of two other functions, and that the values of these functions at certain points imply the zeta function is convergent on the real axis.
3. Allowing for some prime numbers to have different values in the functions does not change the conclusion that the sum of the zeta function tends to zero as the variables approach infinity.
Estimation of G6pd Status in the Rajbangshi Population of SushrutanagarIOSR Journals
The Glucose 6 Phosphate Dehydrogenase (G6PD) deficiency renders the cells susceptible to severe hemolysis under oxidative stress producing conditions. Due to considerable genetic heterogeneity it is found to be distributed in an unequal manner in different parts of the world including India. The present study was undertaken to find the distribution of G6PD deficiency in the Rajbangshi population group of Sushrutanagar, Darjeeling district. The Rajbangshis are one of the oldest tribes residing in North Bengal. A quantitative assay of the G6PD activity was performed in the Rajbangshi population and the non Rajbangshi control population of the same area. The G6PD deficiency was found in 12 percent of the Rajbangshi population studied which is significantly higher than the value of 3.3 percent found in the controls with the lower and upper confidence limit for the population Odds ratio being 3.58 and 25.93 respectively at 95% confidence interval. This high rate of G6PD deficiency in the population group studied poses them to a greater risk for several oxidative stress producing conditions including some commonly used antimalarial drug like Primaquin
This document describes an Adaptive Overtaking Control and Effective Power Generation (AOC-EPG) system for vehicles. The system uses ultrasonic sensors and a microcontroller to measure distance between vehicles and assist safe overtaking. It communicates vehicle positions using RF transmitters to coordinate multiple vehicles. The system also captures kinetic energy lost during gear shifts using a flywheel and generator to produce electrical power for the vehicle or home. The goal is to prevent accidents during overtaking and generate renewable power from vehicle movement.
Estimation of Anti Hbs antibody titer in adults during 5-10 years period foll...IOSR Journals
Health care professional are a high risk group for Hepatitis B and are advised vaccination against hepatitis B. The protective antibodies induced by Hepatitis B vaccination wane gradually over period of time and may reach very low or even undetectable levels. A cross sectional prospective study was undertaken to investigate the persistence of anti-HBs levels in health care professionals who had been immunized with HBV vaccine and the need for booster doses of the vaccine. In this cross-sectional study, health care professionals (18 -55 yrs of age) who had received full course of HBV vaccination were sampled and tested for anti-HBs from May 2010 to June 2011. Plasma samples were tested for anti-HBs using ELISA. Titer >=10 mIU/mL was considered to be seroprotective. Individuals with titre <10 /><0.001).According to the above mentioned results, for a high risk group population such as medical students and residents, who are at continuous exposure to HBV, it is reasonable to determine the anti HBsAb response at one month post vaccination However, in order to confirm the persistence of immune protection, we strongly suggest detection of the anti-HBsAb titer at 5 – 10 years after the last inoculation
Colorization of Gray Scale Images in YCbCr Color Space Using Texture Extract...IOSR Journals
This document describes a technique for colorizing grayscale images by matching texture features between the grayscale image and windows in a color reference image. The technique works by first converting the images to the YCbCr color space, which has decorrelated color channels that allow color to be transferred without artifacts. Texture features like energy, entropy, homogeneity, contrast and correlation are then extracted from windows in the color image and compared to the grayscale image to find the best matching window. The mean and standard deviation of color values in the matching window are then imposed on pixels in the grayscale image to transfer color, while retaining the original luminance values. This process is repeated on small windows across the image to colorize the entire grayscale input.
Estimating the Statistical Significance of Classifiers used in the Predictio...IOSR Journals
This document summarizes a research paper that analyzes the statistical significance of different classifiers for predicting tuberculosis. The paper first compares the accuracy of classifiers like decision trees, support vector machines, k-nearest neighbor, and naive Bayes on tuberculosis data. It then evaluates the performance of these classifiers using a paired t-test to select the optimal model. The results showed that support vector machines and decision trees were not statistically significant, while support vector machines combined with naive Bayes and k-nearest neighbor were statistically significant.
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
This document discusses a method for securely outsourcing linear programming (LP) computations to the cloud. It proposes to decompose LP computation into public LP solvers running on the cloud and private LP parameters owned by the customer. It develops efficient privacy-preserving problem transformation techniques that allow customers to transform their original LP problem into an arbitrary problem while protecting sensitive input and output. It also explores the duality theorem of LP to derive conditions for validating the computation result with close-to-zero cost. The method aims to achieve practical efficiency for secure outsourcing of LP problems to the cloud.
Effect of Seismic Joint in the Performance of Multi-Storeyed L-Shaped BuildingIOSR Journals
The choices of building shapes and structural systems have significant effect on their seismic performance. While symmetrical buildings result in a fairly uniform distribution of seismic forces throughout its components. Unsymmetrical buildings result in highly indeterminate distribution of forces making the analysis and prediction more complicated. L-shaped buildings are among those unsymmetrical structures which are most commonly found in practice in the form of school, office, commercial buildings. In this work three dimensional models of L-shaped buildings are investigated for their seismic performance, varying bay length and storey height. These models were analysed for three conditions viz with gap, with seismic joint and with neither of these. The modeling of structures analysis is carried out using STAAD Pro V8i, also the performance is analysed providing brick infill and compared with, without infill condition. Performances is measured in terms of displacements, axial forces, bending moments, shear forces and compared for those conditions mentioned in the identified column viz., corner, intermediate and interior
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...IOSR Journals
The simple explanation is that in nature and in manufacturing, things leak. Vacuum impregnation
stops leak. The ultimate goal of vacuum impregnation is to seal leak/migration paths without impacting the
functional, assembly or appearance characteristics of a part. The impregnation chamber which is used in VPI
process operates maximum up to 80 to 150 psi.it is important to analyse and design the pressure vessel that will
provide safety, durability and serviceability to the company. Accomplishing this task will require a very good
understanding of behaviour and a good knowledge of parameters that affecting the pressure vessel due to
varying loads, pressure and thickness of shell element. The most important one is that the given geometry of
pressure vessel must be analysed to assure it should meet the design standards
An Exploration of HCI Design Features and Usability Techniques in GamingIOSR Journals
Abstract: This Conference paper explores the human computer interaction design features relating to gaming
industry. The HCI user design interface development and HCI Usability expectations are discussed in this
paper. HCI design features of Simple Sudoku and Contemporary HCI Expectations are also discussed. And
suggestions are given to develop the Simple Sudoku as per HCI standards and expectations.
Keywords: Brain Computer Interface, Gestures Recognition, Hand Gestures in 3D, Pattern Language
Management Tool, Real Time Strategy Games
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...IOSR Journals
The document summarizes a study on the analgesic (pain-relieving) effects of methanolic and petroleum ether extracts of Vitex negundo (leaves) in mice. The study found that both extracts significantly reduced pain behaviors in mice in a dose-dependent manner in the acetic acid-induced writhing test, indicating that they possess peripheral analgesic properties. The methanolic extract showed stronger analgesic effects than the petroleum ether extract. The results provide support for the traditional use of V. negundo leaves to treat painful conditions and suggest that compounds in the plant like flavonoids may contribute to its analgesic activity.
The Evaluation of p-type doping in ZnO taking Co as dopantIOSR Journals
P-type doping is excessively difficult in wide-band gap semiconductors, such as GaN, ZnSe, and
indeed ZnO. Practically it is very difficult to obtain stable and true p-type ZnO. Under standard conditions there
are reports on decaying or even completely absent p-type conductivity. Several hypotheses have been
formulated to explain this unusual behaviour. The commonly accepted theory is that the elements assume
undesired (non-substitutional) positions or form complexes, resulting in self-compensation of the p-type
conductivity. Note that p-dopants can be compensated by low energy native defects, such as Zni or VO, or
background impurities, such as aforementioned H. Deep impurity levels can cause significant resistance to the
formation of a shallow acceptor level. In this work the p-type doped Zno based samples are prepared where
incorporation of Co into the ZnO crystal lattice is done and various measurements like Sheet resistivity, Hall
Voltage, Hall mobility and 2d hole concentration are made. From the results it has been clearly found that the
p-type doping takes place successfully and can be used for various future applications
A Comparative Study on Recovery Pulse Rate after 12 Minute Run and Walk TestIOSR Journals
Abstract: The sports are a world-wide phenomenon today. In the world history, sports was a popular
organization and important as today. It has been an interesting aspect for human amusement and a cultural
phenomenon at great magnitude. It has got mass participation, as it attracts people either for recreations,
physical fitness or performance.The effectiveness of using the heart rate (HR) as an indicator of exercise
intensity to monitor of all games and sports and any physical activity. However, recently new regulations and a
trend towards a more conditional games have prompted a need to revise field study procedures and demand the
increased specialization of games’ concerned. Yoga has been become increasingly popular in the world as a
method to reduce stress and as a means of exercise and fitness training also for recovery purpose as well. The
purpose of the study was to compare the differences on recovery pulse rate among, Yoga Nidra group ,Savasana
group and Control group, (25 of each group). For the purpose of the study 75 male B.P.Ed students from
P.G.G.I.P.E Banipur North 24 pgs, West Bengal were selected as the subjects for this study. The age of the
subjects was between 22-25 years. Recovery Pulse Rate was only the variable of the study. ‘ANOVA’ was
applied to calculate the collected data at 0.05 level of significance and to indentify the significance differences
among the means critical difference was used as a Post-hoc test. The result showed that there was no
significant difference between Control group and Savasana group but significance difference were observed
between Control group and Yoga Nidra group, and between Savasana group and Yoga Nidra group.
Key Words: Recovery pulse rate, Yoga Nidra group, Savasana group, Control group
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
Abstract: A biometric system provides automatic recognition of an individual based on a unique feature or
characteristic possessed by the individual. These biometric characteristic may physiological or behavioral.
Unlike other identification methods such as id proof, tokens and password, the distinct aspect of biometric
recognition comes into light from randomly distributed features in human being. In this paper, I describe the
novel comparison based upon various aspects to make easy selection for biometric device deployment in specific
environment. This paper proposes a comparison among all kind of biometric system available in the society.
The existing computer security systems used at various places like banking, passport, credit cards, smart cards,
PIN , access control and network security are using username and passwords for person identification.
Biometric systems also introduce an aspect of user convenience; it means one can be authorized by representing
himself or herself. In this paper, the main focus is on working principal of biometric technique, the various
biometrics systems and their comparisons.
Keywords: Biometrics, authentication, identification, recognition
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile
communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by
using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on
quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s
performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant
minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) .
Assessment of Combinatorial Support Assemblies and Their Energy Matrixes in H...IOSR Journals
The bolt and nut coupling are fundamental design requirement for machines and steel structures and
their relevance and utilization are of topmost priority in the areas of their application. The paper viewed the
component parts and dimensions of this coupling from the perspective of energy content delivery, balancing and
equilibrium. This result from the fact that the supply of compression torque on the coupling converts ingrained
residual energy in the individual parts into utility energy assets for the support and sustenance of structures of
interest. The mechanics and practicality of this energy matrix theory has been investigated using congruent
scientific analysis, conventional tables, lab test data and graphics which depicts boundary behavioral
tendencies resulting from structural realignments in the face of increasing load value. The extreme limit of this
realignments, culminate in varying degrees of yield conditions particular viewed as deformation, which occurs
at the point of lowest energy availability in the coupled system.
Node detection technique for node replication attack in mobile sensor networkIISRT
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods. Simulation results show the proposed clustering approach increases energy efficiency and reduces packet loss compared to methods that broadcast identity and location information.
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
This document discusses techniques for detecting node replication attacks in mobile sensor networks. It describes how node replication attacks work by allowing adversaries to create low-cost replica nodes with the same identity as legitimate nodes. Existing centralized detection methods for static networks, like using witness nodes or sending location data to a base station, do not work well for mobile networks where node locations change. The document proposes a new distributed detection method using cluster heads and encryption/decryption to detect replicated nodes based on their velocities. It argues this new method has advantages in accuracy, efficiency and reducing energy consumption compared to previous approaches.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
This document discusses security threats and techniques in wireless sensor networks. It begins by describing wireless sensor networks and their components like sensor nodes. It then discusses some applications of wireless sensor networks such as in military, environment monitoring, healthcare, and robotics. The document outlines several common network attacks on wireless sensor networks including spoofed or altered routing information, selective forwarding, Sybil attacks, denial of service attacks, sinkhole/blackhole attacks, and wormhole attacks. It explains how traditional security mechanisms can detect some internal attacks but fail against compromised nodes. The document introduces trust and reputation techniques as alternatives to overcome issues with compromised nodes.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
This document summarizes research on detecting replica nodes in wireless sensor networks. It first discusses how adversaries can create replica nodes by compromising sensor nodes and stealing their keying materials. It then reviews various approaches for replica node detection, including using tamper-resistant hardware, randomized efficient distributed protocols, and leveraging knowledge of sensor deployment locations. The document proposes a new scheme using sequential probability ratio testing to detect mobile replica nodes based on analyzing the speeds between consecutive location claims from sensor nodes. This approach aims to quickly detect replica nodes compared to existing techniques.
This document summarizes research on detecting replica nodes in wireless sensor networks. It first discusses how adversaries can create replica nodes by compromising sensor nodes and stealing their keying materials. It then reviews various approaches for replica node detection, including using tamper-resistant hardware, randomized efficient distributed protocols, and leveraging knowledge of sensor deployment locations. The document proposes a new scheme using sequential probability ratio testing to detect mobile replica nodes based on analyzing the speeds between consecutive location claims from sensor nodes. This approach aims to quickly detect replica nodes compared to existing techniques.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
This document discusses intrusion detection in homogeneous and heterogeneous wireless sensor networks. It proposes analyzing intrusion detection under two models: single-sensing detection using a single sensor and multiple-sensing detection using multiple collaborating sensors. The document finds that a heterogeneous wireless sensor network with sensors having different capabilities increases detection probability compared to a homogeneous network. It analyzes network connectivity and broadcast reachability, which are important for ensuring detection probability in wireless sensor networks.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
This document summarizes a research paper that proposes using network coding to improve the efficiency of dynamic source routing in wireless sensor networks. The paper describes how typical sensor networks rely on a central processing station that causes congestion. It then discusses network coding and how it allows intermediate nodes to encode packets before forwarding. The paper proposes a scheme where some sensor nodes act as aggregators that apply network coding on received packets from neighboring sensors if the data is significantly different. Simulation results show this approach reduces total transmissions for networks with up to 75 nodes, improving efficiency, but performance degrades for larger networks potentially due to increased collisions.
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
This document summarizes a research paper about intrusion detection in homogeneous and heterogeneous wireless sensor networks. It discusses analyzing intrusion detection under two scenarios: single-sensor detection, where one sensor can detect an intruder, and multiple-sensor detection, where collaboration is needed. The paper analyzes detection probability with respect to intrusion distance and network parameters like node density and sensor ranges. Simulation results show heterogeneous networks with sensors of varying ranges increase detection probability over homogeneous networks.
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
The document describes a proposed wireless intrusion detection system and new attack model. It begins by outlining vulnerabilities in mobile wireless networks like susceptibility to eavesdropping and interfering attacks. It then discusses the need for intrusion detection as prevention measures alone are insufficient. The proposed system uses a matching algorithm to compare observed network behaviors and detect anomalies indicative of intrusions. It analyzes evidence from multiple nodes to identify intruders, multicasts intruder addresses to neighbors, and routes data along paths free of detected intruders.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 5 (Mar. - Apr. 2013), PP 21-26
www.iosrjournals.org
Defending Against Replication Node Attack in Wireless Sensor
Network
S.Pavaimalar1, G.ShenbagaMoorthy2 , Dr.C. Kumar Charlie Paul3
1
(Department of CSE, A.S.L Pauls College of Engineering &Technology, India)
2
(Department of CSE, A.S.L Pauls College of Engineering &Technology, India)
3
(Department of ECE, A.S.L Pauls College of Engineering &Technology, India)
Abstract: In Wireless Sensor network, nodes are interconnected and information is shared among them. In a
situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node
replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address of
node to make replicas of them and then mount a variety of attacks with these replicas. Opponent controls the
entire network and misuse the whole network. Our goal is to detect and block the nodes which are captured by
attacker. Sequential Probability Ratio Test is a technique which is used to find the capture node by using two
approaches. However, this technique is used to detect the capture node only which affects the neighbor node
and have a chance to collapse the network. Blocking Technique is needed to block the particular node captured
by attacker. In this work, we propose a fast and effective method for improving the detection of node using the
Black Roll technique to effectively block the node by creating a blacklist table which contains block node IP
address. Protowall is a tool which is used to block the IP address that is on a blacklist table.
Keywords-Wireless Sensor Network, Sequential Test, Black roll, Protowall
I. INTRODUCTION
Wireless sensor network was primarily developed as a military application to survey a battlefield.
However, now a WSN is commonly used in many other industrial and commercial applications to monitor
environmental conditions, health care applications and traffic controls. There are many different kinds of
wireless sensor networks however; they all normally come equipped with a radio transceiver or a wireless
communication device or a power source.
There are many applications to this technology and typically involve monitoring, tracking or
controlling. Area monitoring comes as one very commonly used to be able to track any kind of movement
whether it is heat, pressure, sound, light or vibrations in an specific area. This technology is now being utilized
by almost every industry and this includes the environmentally related industry as this is a technology which
allows the reading of many different kinds of changes in the atmosphere and how they can guide those in the
industry to determine simple factors like water levels or more complex aspects of the environment like the
possibility of an earthquake in an specific area.
Vehicle tracking and movement can also be tracked through this technology and therefore, it is also
being used by the security industry. Medical science also depends on the wireless sensor network to be able to
track the changes on some of the health monitors which will immediately notify the medical staff of a change in
the monitoring device.
In potentially hostile environments, the security of unattended mobile nodes is extremely critical. The
attacker may be able to capture and compromise mobile nodes, and then use them to inject fake data, disrupt
network operations, and eavesdrop on network communications. An adversary may replicate captured sensors
and deploy them in the network to launch a variety of insider attacks. This attack process is referred to as clone
attack. Mobile nodes, essentially small robots with sensing and wireless communications are useful for tasks
such as static sensor deployment, adaptive sampling, network repair, and event detection. These advanced
sensor network architectures could be used for a variety of applications including intruder detection, border
monitoring, and military patrols.
www.iosrjournals.org 21 | Page
2. Defending Against Replication Node Attack in Wireless Sensor Network
Figure 1.Wireless Sensor network
In the network, attacker capture nodes by using IP address and inject fake data to network. Misuse the network
and help to enemies to collapse the network. Finally, to protect the network from adversary to provide a
technique called black Roll in which to block the capture node from the other node connection.
II. PROBLEM DEFINITION
2.1 Problem Statement
We define a mobile replica node N as a node having the same ID and secret keying materials as a
mobile node u. An adversary creates replica node N as follows: He first compromises node N and extracts all
secret keying materials from it. Then, he prepares a new node N1, sets the ID of N to the same as u, and loads
N‟s secret keying materials into N1.There may be multiple replicas of N, there may be multiple compromised
and replicated nodes.
2.2 Network Assumptions
We consider a two-dimensional mobile sensor network where sensor nodes freely roam throughout the
network. We assume that every mobile sensor node‟s movement is physically limited by the system-configured
maximum speed. We also assume that all direct communication links between sensor nodes are bidirectional.
This communication model is common in the current generation of sensor networks. We assume that an
adversary may compromise and fully control a subset of the sensor nodes, enabling him to mount various kinds
of attacks. For instance, he can inject false data packets into the network and disrupt local control protocols such
as localization, time synchronization, and route discovery process. Furthermore, he can launch denial of service
attacks by jamming the signals from benign nodes.
III. EXISTING SYSTEM
3.1 Sequential Probability Ratio Test
This technique is the first step to block the capture node. For blocking the node, it is essential to detect
the capture node by attacker. To detect the node by using Sequential Probability Ratio Test in which it provides
two approaches by obtaining node‟s Speed. In static sensor networks, a sensor node can be considered to be
replicated if it is placed at more than one location. However, if nodes are allowed to freely roam throughout the
network, the above technique does not work because the mobile node‟s location will continuously change as it
moves. Hence, it is imperative to use some other technique to detect replica nodes in mobile sensor networks.
Fortunately, mobility provides us with a clue that can help resolve the mobile replica detection problem.
Specifically, a mobile sensor node should never move faster than the system-configured maximum speed.
Accordingly, if we observe that the mobile node‟s speed is over the maximum speed, it is then highly likely that
at least two nodes with the same identity are present in the network.
We apply SPRT to the mobile replica detection problem as follows. Each time a mobile sensor node
moves to a new location, each of its neighbours asks for a signed claim containing its location and time
www.iosrjournals.org 22 | Page
3. Defending Against Replication Node Attack in Wireless Sensor Network
information and decides probabilistically whether to forward the received claim to the base station. The base
station computes the speed from every two consecutive claims of a mobile node and performs the SPRT by
taking speed as an observed sample. Each time maximum speed is exceeded by the mobile node; it will expedite
the random walk to hit or cross the upper limit and thus lead to the base station accepting the alternate hypothesis
that the mobile node has been replicated. On the other hand, each time the maximum speed of the mobile node is
not reached, it will expedite the random walk to hit or cross the lower limit and thus lead to the base station
accepting the null hypothesis that mobile node has not been replicated. Once the base station decides that a
mobile node has been replicated, it initiates revocation on the replica nodes.
3.2 Protocol description
Every sensor node gets the secret keying materials for generating digital signatures. We will use an
identity-based public key scheme such as. It has demonstrated that public key operations can be efficiently
implemented in static sensor devices.
Moreover, most replica detection schemes employ an identity-based public key scheme for the static
sensor networks. Mobile sensor devices are generally more powerful than static ones in terms of battery power
due to the fact that the mobile sensor node consumes lots of energy to move.
Algorithm for SPRT detection
INITIALIZATION: n=1, y=0
INPUT :Nt
OUTPUT: accept the hypothesis Ho or H1
compute s0(t) and s1(t)
if Nt ==0 then
x=x+1
endif
if x>=s1(n) then
accept the alternate hypothesis H1 and
terminate the test
endif
if x<=s0(n) then
accept the null hypothesis H0 and
initialize n to 1 and x to 0
return;
endif
n=n+1
Upon receiving a location claim, the base station verifies the authenticity of the claim with the public
key of node u and discards the claim if it is not authentic. We denote the authentic claims from node u by
C1u,C2u, . . . ,. The base station extracts location information Liu and time information Ti from claim Ciu. Let di
denote the Euclidean distance from location Li−1u at time Ti−1 to Liu at Ti. Let oi denote the measured speed at
time Ti, where i = 1, 2. . . In other words, oi is represented as:
oi = di/|Ti − Ti−1| (1)
Let Si be denoting a Bernoulli random variable that is defined as:
0, 𝑖𝑓 𝑜𝑖 ≤ 𝑉𝑚𝑎𝑥
𝑆𝑖 =
1, 𝑖𝑓 𝑜𝑖 > 𝑉𝑚𝑎𝑥
The success probability of Bernoulli distribution is defined as:
Pr(Si = 1) = 1 − Pr(Si = 0) = (2)
If is smaller than or equal to a preset threshold⋋ ′, it islikely that node u has not been replicated.
On the contrary, if >⋋ ′ , it is likely that node u has been replicated. The problem of deciding whether u has
been replicated or not can be formulated as a hypothesis testing problem with null and alternate hypotheses of
≤ 0 and > ’, respectively.
www.iosrjournals.org 23 | Page
4. Defending Against Replication Node Attack in Wireless Sensor Network
IV. PROPOSED SYSTEM
4.1 Black list table
Capture node is detected by using SPRT technique. After detect the node, the base station sends
message to the server which involves capture node information like node name, address. In server, blacklist is
created in it which is authenticated by using RSA algorithm. This table involves Blocking node IP address and
their properties.
If a user misbehaves, the server may link any future connection from this user within the current link
ability window (e.g., the same day). A user connects and misbehaves at a server during time period t within link
ability window w. As part of the complaint, the server presents the nimble ticket of the misbehaving user and
obtains the corresponding seed from the NM. The server is then able to link future connections by the user in
time periods tc; tc þ 1; . . . ; tL of the same link ability window w to the complaint. Therefore, once the server
has complained about a user, that user is blacklisted for the rest of the day, for example (the link ability
window). Note that the user‟s connections in t1; t2; . . . ; t_; t_ þ 1; . . . ; tc remain unlink able (i.e., including
those since the misbehavior and until the time of complaint). Even though misbehaving users can be blocked
from making connections in the future, the users‟ past connections remain unlink able, thus providing backward
unlink ability and subjective blacklisting.
4.2 Protowall
To block the bad IP address to use a tool called Protowall which is a closed source freeware program
for IP blocking in a network. Protowall is a lightweight program that runs in the background, taking up little
CPU and memory, while blocking thousands of bad IP addresses. In Protowall, all the work is done by the
driver that filters each packet, extracts the IP header and then compares the address with the ones in the table,
then either discards or permits the packet to pass. The GUI is essentially a "driver instructor" that communicates
to the driver the IP list to check against. The GUI also receives notifications from the driver when a packet
arrives and when actions are performed with a packet. Protowall Blocks both inbound and outbound packets.
Protowall blocks incoming packets from Internet addresses that are on the Blue tack Blacklists. This is handled
by another program called the Block list Manager. This program finds and retrieves lists of bad IP addresses.
ProtoWall's filtering is controlled by the use of block lists, text files containing the IP addresses of
organizations opposed to file-sharing . Protowall achieves this via a low-level driver that filters network traffic.
It is capable of filtering all NDIS protocols including IPV6 and, most importantly, TCP/IP and UDP – two
protocols which are essential for the operation of file-sharing software. The driver sits at a low-level in the
system and consequently there is only a small loss of performance when the driver is active.
V. MODULE DESCRIPTION
5.1 Network Construction
Nodes are interconnected and the resources can be shared among them. Data transfer the network
must be properly controlled and handled. In network Construction, two types of nodes is used. Source node is
connected to the neighbor node which provides specific name and specific address. Path connection is
established in between source and neighbor node in a particular network.
5.2 Key Generation
It provides authentication to node in a network to give security. Algorithm used to generate key is RSA
algorithm.
Three steps of RSA algorithm are
• Key generation
• Encryption
• Decryption
www.iosrjournals.org 24 | Page
5. Defending Against Replication Node Attack in Wireless Sensor Network
RSA Algorithm
Key Generation Algorithm
Generate two large random primes, p and q.
Compute n = p*q and z = (p-1)(q-1).
Choose a number relatively prime to z and call it d.
Find e such that e*d=1 mod z.
The public key is (n, e) and the private key is (n, d).
Figure 2.Flowchart
Encryption
Sender A does the following:-
Obtains the recipient B's public key (n, e).
Represents the plaintext message as a positive integer m.
Computes the cipher text c =m^e mod n.
Sends the ciphertext c to B.
Decryption
Recipient B does the following:-
Uses his private key (n, d) to compute m = c^d mod n.
Extracts the plaintext from the integer representative m.
5.3 Attacker Model
It uses Sequential Probability Ratio Test which involves uncompromised mobile node should never
move at speeds in excess of the system-configured maximum speed (Vmax). The base station calculates the
speed from all two successive claims of node.
Two approaches
1. Null Hypothesis - Node‟s speed is below Vmax, node has not been replicated.
2. Alternate Hypothesis - Node‟s speed exceedsVmax, node has been replicated.
www.iosrjournals.org 25 | Page
6. Defending Against Replication Node Attack in Wireless Sensor Network
5.4 Black Roll
Black list Table is created in server, it involves capture node information obtained from server. To
provide authentication, keys are generated in table using RSA algorithm. Protowall is designed to block capture
node in network. It extracts the IP header and then compares the address with the ones in the table, and then
either discards or permits the packet to pass. Protowall blocks packets from Internet addresses that are on the
Blacklists. It finds and retrieves lists of bad IP addresses.
VI. APPLICATIONS
Machine health monitoring
Industrial sense and control applications
Preventing natural disaster
Irrigation management
Smart home monitoring
VII. CONCLUSION
The existing system is used for replica detection scheme for mobile sensor networks based on the
SPRT. Analytical demonstration about the limitations of attacker strategies to evade the detection technique is
done. In particular, the limitations of a group attack strategy in which the attacker controls the movements of a
group of replicas is discussed and presented quantitative analysis of the limit on the amount of time for which a
group of replicas can avoid detection and quarantine. In this paper, to propose a method to protect the network
from adversary by using a technique called Black Roll which is used to block the capture node in a sensor
network; it improves the detection of node replication node attacks in wireless sensor network.
REFERENCES
[1] Jun-Won Ho, Mathew Wright and Sajal K.Das (2011), „Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks
using Sequential Hypothesis Testing‟, IEEE Transactions on Mobile computing.
[2] J.-Y.L. Boudec and M. Vojnovi_c, “Perfect Simulation and Stationary of a Class of Mobility Models,” Proc. IEEE INFOCOM,pp.
2743-2754, Mar. 2005.pp. 2743-2754, Mar. 2005.
[3] S. Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 22 1-
232, Feb. 2006.
[4] M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, “A Randomized, Efficient, and Distributed Protocol for the Detection of Node
Replication Attacks in Wireless Sensor Networks,” Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
[5] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G.S.Sukhatme, “Robomote: Enabling Mobility in Sensor Networks,”Proc.
Fourth IEEE Int‟l Symp. Information Processing in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.
[6] J. Ho, M. Wright, and S.K. Das, “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential
Analysis,”Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
[7] Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,
“Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
[8] L. Hu and D. Evans, “Localization for Mobile Sensor Networks,”Proc. ACM MobiCom, pp. 45-57, Sept. 2004.
[9] J.Jung,V. Paxon, A.W. Berger,andH.Balakrishnan,“Fast Portscan Detection Using Sequential Hypothesis Testing,” Proc.IEEE Symp.
Security and Privacy, pp. 211-225, May 2004.
[10] K. Xing, F. Liu, X. Cheng, and H.C. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks,” Proc. IEEE Int‟l Conf.
Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
www.iosrjournals.org 26 | Page