Professional Documents
Culture Documents
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
Aim
A fast and effective mobile replica node detection. To detect replica node attacks Sequential Probability Ratio Test (SPRT)
Abstract
Sensor nodes report to base station. Malicious attacks in sensor networks. Dangerous attack is the replica node attack. Time and effort.
Domain
MOBILE COMPUTING Mobile replica node detection. Obtaining the distance information. Communication is bidirectional.
Modules :
Neighbour node detection. Data communication. Attacker models.
Hardware requirements :
JavaFX 1.3
Software requirements :
Existing System
Static sensor networks.
Proposed System
Nodes to encrypt, decrypt and authenticate communications. Sequential Hypothesis Test (SHT).
Architecture Diagram
Base Station
SN
SN
SN
AN
SN
Data communication
Bidirectional
Attacker Models
Sequential Hypothesis Testing Null hypothesis Alternative hypothesis
Literature Survey
S.N o Title, Author, Publication name, year Inference of the paper Conclusion
1.
TITLE: Localized Multicast: Efficient and Distributed Replica Detection in LargeScale Sensor Networks BY:BoZhu; Setia.S, Jajodia.S, Roy.S.,Lingyu Wang; Publication name: Mobile Networks and Applications, vol :9 Issue:7. pp. 913 926 YEAR: July 2010
Efficient in communication and memory costs in large-scale sensor networks, and at the same time achieves a higher probability of detecting node replicas.
S.N o 2.
Title, Author, Publication name, year TITLE: Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
Inference of the paper the provision of citywide broadband communication capability to mobile users through private Wi-Fi networks that are in range but belong to others.
Conclusion
BY:Efstathiou, E.C.Franoudis, P.A.Polyzos. Publication name: Mobile Networks and Applications, vol :9 Issue:7. pp. 1147 1160 YEAR: Aug. 2010
S.N o
Conclusion
3.
Eliminates the correlation among packets and thus provides the perfect BY: Yun Zhou; Xiaoyan resilience to packet Zhu; Yuguang Fang; loss Publication name: Mobile Networks and Applications, vol :9 Issue:7. pp. 982 993 YEAR: July 2010
S.N o
Conclusion
4.
TITLE: Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route BY: Tao Shu; Krunz, M.; Sisi Liu; ; Publication name: Mobile Networks and Applications, vol :9 Issue:7. pp. 941 954 YEAR: July 2010
data delivery mechanisms that can withstand high probability black holes formed by Compromised node and denial of service attacks. .
S.N o
Conclusion
5.
TITLE: Virtual EnergyBased Encryption and Keying for Wireless Sensor Networks BY:Uluagac.A.S.; Beyah.R.A.;YingshuLi; Copeland,J.A.; Publication name : Mobile Networks and Applications, vol :9 Issue:7. pp. 994 1007 YEAR: July 2010
Designing costefficient, secure network protocols for Wireless Sensor Networks (WSNs).
VEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders.
Replica detection scheme for mobile sensor networks based on the SPRT.
Showed the limitations of a group attack strategy in which the attacker controls the movements of a group of replicas..
conclusion
d23hwgftur
References
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks, Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept. 2009. G. Theodorakopoulos and J.S. Baras, Game Theoretic Modeling of Malicious Users in Collaborative Networks, IEEE J. Selected Areas in Comm., vol. 26, no. 7, pp. 1317-1326, Sept. 2008.
H. Wang, B. Sheng, C.C. Tan, and Q. Li, Comparing SymmetricKey and Public-Key Based Security Schemes in Sensor Networks: A Case Study of User Access Control, Proc. IEEE Intl Conf. Distributed Computing Systems (ICDCS), pp. 11-18, June 2008. K. Xing, F. Liu, X. Cheng, and H.C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks, Proc. IEEE Intl Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
Thank you