Electronic Network - Advantages and Disadvantages
|
|
- Beryl Walters
- 3 years ago
- Views:
Transcription
1 Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism Shobhana S PG Scholar, Dept of CSE, Apollo Priyadarshanam Institute of Technology, Chennai Abstract Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as sink) through an established routing path. Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks and also suffer from injecting bogus or false data attack and send the bogus data to the sink to cause upper-level error decision, as well as energy wasted in en-route nodes. So the proposed work deals with a novel bandwidth-efficient cooperative authentication (BECAN) scheme. This scheme can save energy by early detecting and filtering the majority of injected bogus data at the en-route nodes, so that burden of the sink can be reduced. To filter the bogus data, the BECAN adopts cooperative neighbor router (CNR)-based filtering mechanism. Keywords cooperative bit-compressed authentication, Enrouting filtering, injecting false data attack, sensor network. I. INTRODUCTION Wireless sensor network is consists of large number of sensor nodes which are interconnected through wireless links. It also provided with low-cost equipped with necessary sensing and communicating components. Sensor nodes can be imagined as small computers, extremely basic in terms of their interfaces and their components. They usually consist of processing units with limited computational power and limited memory, sensors, a communication device and a power source usually in the form of a battery. A wireless sensor network deployed at hostile environment mainly concern with monitoring physical or environmental condition and sending reports to base station to take future action. In such environment sensor nodes are subjected to various types of attacks such as eavesdropping, masquerade, selective forwarding. It also suffers from various injecting false data attacks [1], [2]. The adversaries can inject bogus data reports into the WSN through compromised nodes which results in false decision at higher level and also leads to wastage of energy and resources. 24 This may be dangerous in scenarios such as battlefield surveillance and environmental monitoring by making false decision[13]. Moreover, it is a difficult task to monitor all the sensor nodes in the field of interest. At the same time the simultaneous entrance of false data causes not only flooding, but also heavy verification burdens fall into the sink. So some false data filtering mechanisms are used to tackle this problem. II. EASE OF USE The proposed Bandwidth efficient cooperative authentication scheme is used to reduce the impact of bogus data injection into the network through a compromised node is to filter the bogus data by the enroute node as early as possible before reaching the base station. So that, an authentic and accurate data is provided to surrounding sensor node and to the sink. It is an effective way to defeat bogus data injection attacks. In en-route filtering schemes not only the destination node but also the intermediate nodes can check the authenticity of the message in order to reduce the number of hops or nodes the false message travels. It achieves not only high filtering probability but also high reliability. Early detecting the injected bogus data by the en-route sensor nodes reduces the burden of the sink. The contributions of this paper. 1) Wireless Sensor Node Deployment: Wireless sensor network consist of a sink and a large number of sensor nodes randomly deployed at a certain interest region (CIR). Each sensor nodes are stationary in a location and the communication between two sensors nodes are bidirectional. The sensor node close to the sink can directly contact the sink. If the sensor node is far from the transmission range of sink, it makes use of other nodes to establish a route to the sink. Verification can be done in the sink after receiving the report. 2) Cooperative bit-compressed Authentication: The earlier the injected bogus data is detected and more energy can be saved using the proposed bandwidth-efficient authentication scheme. Since the sensor nodes are low-cost and energy constraint, it is desirable to design a bandwidth efficient authentication scheme.
2 3) En-routing Filtering Probability: The effectiveness of proposed scheme can be demonstrated using en-routing filtering probability and detect the false negative rate on true reports. The en-routing filtering probability can be tested as by calculating number of false by en-route nodes from total number of false data. III. PRELIMINARIES A. Elliptic Curve Cryptography Elliptic Curve Cryptography (ECC) is a public key cryptography. In public key cryptography each user or the device taking part in the communication generally have a pair of keys, a public key and a private key, and a set of operations associated with the keys to do the cryptographic operations. Only the particular user knows the private key whereas the public key is distributed to all users taking part in the communication. Some public key algorithm may require a set of predefined constants to be known by all the devices taking part in the communication. Domain parameters in ECC is an example of such constants. Public key cryptography, unlike private key cryptography, does not require any shared secret between the communicating parties but it is much slower than the private key cryptography. The sink distributes the pair key to the sensor nodes during initialization. When a sensor node generates a report m after being triggered by a special event, e.g., a temperature change, it will send the report to the sink via an established routing. The source node encrypts the original text to a cipher text using the encryption technique called Elliptical Curve Cryptography(ECC]. It is a public key encryption technique based on elliptic curve theory [5]. It creates faster, smaller and more efficient cryptography. ECC generate keys through the properties of elliptic curve equation. TinyECC is a configurable library for Elliptic Curve Cryptography (ECC), which allows flexible integration of ECC-based public key cryptography in sensor network applications. It provides a ready-to-use publicly available software package for ECC based PKC operation. B. Message Authentication Code Message Authentication Code (MAC) is a short piece of information used to authenticate a message. It provides assurance to the recipient of the message which came from the expected sender. It is appended to the message then transmitted to the neighboring nodes. It is defined as, MAC (m, k, n) = h (m k) (1) Where m, k, n are a message, a key and an adjustable parameter respectively. The encrypted report along with MAC value is send to the next node to check authentication of the report. The en-route nodes receive the event report verify the validity of the report through the received MAC. If found valid replace the received MAC with its MAC, otherwise drop the report. If an en-route node receives a forged report found the MAC is invalid and drop the report. IV. ENROUTE FILTERATION A. Common Security Threats on WSN An attack is an event that diminishes or eliminates a network's capacity to perform its expected function and an adversary is a person or another entity that attempts to cause harm to the network by unauthorized access or denial of service. Since sensor nodes are deployed in unattended environment an attacker can falsify local sensor values in the area of WSN and may be able to mislead monitors in those areas. So a sensor node is not able to communicate and coordinate with the network and it is disrupted. Fig. 1. Classification of attacks on communication in Wireless sensor network Attacks [9] against wireless sensor networks could be broadly considered from different viewpoints. In the network layer, the key issues include locating destinations and calculating the optimal path to a destination. By tampering with routing service such as modifying routing information and replicating data packets, attackers can fail the communication in WSNs. As shown in Fig.1.attacks that affect the communication can be categorized into routing attack [10] and attacks on transit. 25
3 In routing attack adversaries can gain access to routing paths, redirect the traffic, distribute false information to mislead routing direction or launch DOS attack against routing, acting as black holes to swallow all the received messages and selectively forwarding packets through certain sensors. The routing attacks [9] can be categorized as 1) Selective Forwarding: A malicious node can selectively drop only certain packets. In sensor networks it is assumed that nodes faithfully forward received messages. But some compromised node might refuse to forward packets, however neighbors might start using another route. 2) Altered routing information: Attack against the routing information exchanged between nodes. An adversary can alter or replay routing information. 3) Sinkhole Attack: Attracting traffic to a specific node in called sinkhole attack. In this attack, the adversary s goal is to attract nearly all the traffic from a particular area through a compromised node. Sinkhole attacks typically work by making a compromised node look attractive to surrounding nodes. 4) Sybil Attacks: A single node duplicates itself and presented in the multiple locations. In a Sybil attack, a single node presents multiple identities to other nodes in the network. Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on the sensor network. 5) Wormholes Attacks: In the wormhole attack, an attacker records packet (orbits) at one location in the network, tunnels them to another location, and retransmits them into the network. 6) False data injection: Sensor nodes are not tamper resistant and can be easily compromised by an adversary. In this attack an adversary injects false data and compromises the trust worthiness of the information communicated. False sensing reports can be injected through compromised nodes. B. Enrouting Filtering Scheme Wireless sensor networks (WSNs) have attracted a lot of attention recently due to their broad applications in both military and civilian operations [7]. Many WSNs are deployed in unattended and often hostile environments such as military and homeland security operations. Typically, a sensor detecting an event sends a report to a special node called a sink, which collects and processes such reports. Fig. 2. En-route filtering scheme Wireless sensor networks deployed at hostile environments are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping [2]. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting useless data. The transmission of useless data depletes the constrained battery power and degrades the bandwidth utilization. To detect and drop false data number of en-route filtering schemes have been developed. The earlier the injected bogus data is detected, the more energy can be saved in the whole network. In en-route filtering schemes not only the destination node but also the intermediate nodes can check the authenticity of the message in order to reduce the number of hops or nodes the false message travels is illustrated in Fig. 2. In the en-route filtering phase, every forwarding node verifies the MAC computed by its lower association node, and then removes that MAC from the received report. If the verification succeeds, it then computes and attaches a new MAC based on its pair wise key shared with its upper associated node. Finally, it forwards the report to the next node towards the BS. Here the en-route node receives a report from the source node or the lower associated enroute node and check the integrity of the received report by means of the MAC enclosed in the report. If the verification succeeds then forward the report otherwise drop the report. V. BECAN AUTHENTICATION SCHEME A. Sensor Node Deployment The sink deploys these initialized sensor nodes at certain region. 26
4 Each sensor nodes are stationary in a location and the communication between two sensors nodes are bidirectional are shown in fig.3 [1]. The sensor node close to the sink can directly contact the sink. If the sensor node is far from the transmission range of sink, it makes use of other nodes to establish a route to the sink. Algorithm 1. Dijkstra s Single Source All Shortest Path 1: procedure DIJKSTRA(G = (V, E)) 2: for each vertex v in graph 3: dist[v] := infinity 4: end for 5: dist[source] :=0; 6: Q := the set of all nodes in graph ; While Q is not empty Remove u from Q 7: if dist[u] = infinity 8: break 9: end if 10: alt := dist[u] + dist_between(u,v); 11: If alt < dist[v]; 12: dist[v] := alt; 13: previous[v] := u; Fig. 3. Deployment of Sensor Nodes Each sensor is preloaded with a secret key shared with the sink. The sensor node ID s are register to the Sink via Router. Between the sensor nodes they elect the cluster head using the high battery and memory power. To enable en-route nodes to verify reports, the sink sends the indices of the latest hash values on the corresponding hash chains to each cluster head. B. Key Sharing and Path Finding Sink share their Public keys for each particular sensors, after choosing the Cluster Head of a particular region [4]. The Dijkstra s Algorithm is suitable for finding the shortest path between the sensor nodes. Sensors their routing protocol to the sink using the shortest path algorithm. The multiple paths will be found to the Cluster Head for data transmission.the Dijkstra s Algorithm is used for finding the shortest path between the sensor nodes and to the sink. It can be represented as an undirected graph G = (V, E), where V is an set of vertices which represents the sensor nodes {N 0, N 1,...} and E is the set of edges. 14: end if 15: end for 16: end while 17: return dist 18: end procedure C. Cooperative Neighbor Router (CNR)-Based Filtering Mechanism The proposed system deals with a novel bandwidthefficient cooperative authentication (BECAN) scheme for filtering injected bogus data. To filter the bogus data injected by compromised sensor nodes, the BECAN adopts cooperative neighbor router (CNR)-based filtering mechanism. CNR consist of three components that work in concert to detect and filter out forged messages: (1) each legitimate report carries multiple MACs generated by different nodes that detect the stimulus, (2) intermediate forwarding nodes detect incorrect MACs and filter out false reports en-route, and (3) the sink verifies the correctness of each MAC and eliminates remaining false reports that elude en-route filtering. The sink distributes the pair key to the sensor nodes during initialization. When a sensor node generates a report m after being triggered by a special event, e.g., a temperature change, it will send the report to the sink via an established routing. 27
5 Fig. 4. Cooperative CNR based authentication mechanism Fig. 4 shows the sensor (source) node has sensed some data m and is ready to report m to the sink via the routing path [1]. While transmitting the data to the sink the source node will gains the current Timestamp. In the cooperative CNR-based authentication, the MAC authentication does not work, if the number of the neighbors of the source node is less than the preset threshold. The effectiveness of our proposed scheme can be demonstrated using en-routing filtering probability and detect the false negative rate on true reports. The false negative rate (FNR) of the true reports is tested as, the number of true data that cannot reach the sink from the total number of true data. If FNR is small, the BECAN scheme is demonstrated high reliability. When the number of independent reports increases, the FNR decreases. Thus, the multireports technology in this scheme fits to the realistic scenarios. As the result, the BECAN scheme can achieve high reliability. VI. DETECTING GANG INJECTION ATTACK A new stronger injecting false data attack, called gang injecting false data attack, occurs in wireless sensor networks. This kind of attack is usually launched by a gang of compromised sensor nodes controlled and moved by an adversary. Fig.5.Gang injecting bogus data attack When a compromised source node is ready to send a false data, several compromised nodes will first move and aggregate at the source node, and then collude to inject the false data. Because of the mobility, the gang injecting false data attack is more challenging and hard to resist. To tackle this kind of attack a possible solution with the BECAN scheme is to require each participating sensor node to provide its position information. If the current position is not consistent with the previous ones, the gang attack can be detected. To find out gangs injecting false data attack shown in Fig.5, the proposed scheme make use of Ad hoc ondemand distance vector (AODV) routing protocol [11]. We preferred AODV as routing protocol because it does not need any central administrative system to control the routing process. Generally reactive routing protocols like AODV tend to reduce the control message overheads at the cost of increased latency in finding new routes and also it reacts relatively fast to the topology changes in the network and updates only the nodes affected by these changes. It also saves storage place and energy. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving. VII. CONCLUSION Existing filtering mechanism do not provide high filtering probability, which results in false decision at higher level and also leads to wastage of energy and resources. Compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. On the other hand BECAN scheme has been demonstrated to achieve not only high enrouting filtering probability but also high reliability with multi-reports. Due to the simplicity and effectiveness, the BECAN scheme could be applied to other fast and distributed authentication scenarios, e.g., the efficient authentication in wireless mesh network. One of the main contributions of the proposed work is CNR based filtering mechanism and also it does not require a complicated security association because of noninteractive key establishment. While our current focus is distribution of enrouting authentication to all sensor nodes along the routing path, it is important to notice it is bandwidth efficient. To save bandwidth, it also adopts the bit-compressed authentication technique. Currently, the scheme lacks preventing the gang injecting false data attack from mobile compromised sensor nodes. 28
6 Acknowledgment Foremost I thank Almighty Lord for success full completion of my thesis. I would like to express my sincere gratitude to my guide Ms.G.Sumathi, for her guidance. She helped me in all the time of my studies and writing of this thesis. Finally I thank my parents who always encourages for my higher studies. REFERENCES [1] Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, and Xuemin (Sherman) Shen, BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, January [2] S. Zhu, S. Setia, S. Jajodia, and P. Ning, An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proc. IEEE Symp. Security and Privacy, [3] F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks, Proc.IEEE INFOCOM 04, Mar [4] K. Akkaya and M. Younis, A Survey on Routing Protocols for Wireless Sensor Networks, Ad Hoc Networks, vol. 3, no. 3, pp , May [5] A. Liu and P. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, Proc. Seventh Int l Conf. Information Processing in Sensor Networks (IPSN 08),pp , Apr [6] Y. Zhang, W. Liu, W. Lou, and Y. Fang, Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks, IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp , Feb [7] R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, An Analysis of a Large Scale Habit Monitoring Application, Proc.Second ACM Int l Conf. Embedded Networked Sensor Systems (Sensys 04), [8] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, An Efficient Identity- Based Batch Verification Scheme for Vehicular Sensor Networks, Proc. IEEE INFOCOM 08, Apr [9] A.D. Wood and J.A. Stankovic (2002), Denial of service in sensor networks, IEEE Computer, Vol. 35, No. 10, pp [10] J. A. Al-Karaki and A. E. Kamal(2004), Routing Techniques in Wireless Sensor Networks: A Survey, IEEE Wireless Commun., vol.11, no. 6. [11] Usop, N. S. M. Azizol Abdullah. Abidin, A.F.A. (2009), Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment, International Journal of Computer Science and Network Security (IJCSNS), Vol.9 No.7, pp [12] L. Zhou and C. Ravishankar, A Fault Localized Scheme for False Report Filtering in Sensor Networks, in Proceedings of the IEEE International Conference on Pervasive Services,2005. [13] C. Hartung, J. Balasalle, and R. Han(2004), Node compromise in sensor networks: The need for secure systems, Technical Report CU-CS , Department of ComputerScience, University of Colorado at Boulder.H. Yang and S. Lu (2006), Commutative cipher based en-route filtering in wireless sensor networks, in Proc. IEEE VTC, 2004, vol. 2, pp
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationResistance of Denial-of-Service Attack in Network Coding using Node Authenticity
Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationDENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
More informationSecured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationSECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
More informationProtection of Wireless Sensor Network from Gang Injecting False Data Attack
Protection of Wireless Sensor Network from Gang Injecting False Data Attack D.Vimala 1, R.Srinivasan 2, R.Vinoth 3, D.Vinoth 4, M.M.Arun Prasath 5 Asst. Professor, Dept of EEE, PGP College of Engg & Tech,
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationSecure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationEvaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks
2013 First International Conference on Artificial Intelligence, Modelling & Simulation Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks Mohamad Nazim Jambli,
More informationSecurity and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
More informationReview of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationEfficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
More informationSECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationINTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK
INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK Kruahnadeo Belerao M.E. student JSPM Imperial College Of Engg. Wagholi,Pune Vinod Wadane M.E. student JSPM Imperial College Of Engg. Wagholi,Pune ABSTRACT
More informationPreventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
More informationSecurity and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
More informationAnalysis of Typical Secure Routing Protocols in WSN
, pp.41-50 http://dx.doi.org/10.14257/ijsia.2014.8.6.04 Analysis of Typical Secure Routing Protocols in WSN Jingsha He 1,2,a, Bo Zhou 1,b and Ruohong Liu 2,c 1 School of Software Engineering, Beijing University
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN 2278-7763 473
473 Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication Shital Y. Gaikwad M. Tech. (Second Year Student) (Computer Network and Information Security) SGGS Institute of Engineering and
More informationThe Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
More informationA SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
More informationSECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
More informationSingle Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationEFS: Enhanced FACES Protocol for Secure Routing In MANET
EFS: Enhanced FACES Protocol for Secure Routing In MANET Geethu Bastian Department of Information Technology Rajagiri School of Engineering & Technology, Rajagiri Valley P O Kochi-39, India geethubastian@gmail.com
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationDenial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
More informationAccess Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
More informationTHIS: THreshold security for Information aggregation in Sensor networks
THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationEfficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationNeighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationSAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)
More informationUsing Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
More informationENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
More informationSTUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW
STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW Jyoti 1, Mrs. Sonal Beniwal 2 1 M.Tech Scholar BPSMV, Khanpur, Sonepat 2 Assistant Professor, BPSMV, Khanpur, Sonepat Abstract: Wireless security
More informationStrictly as per the compliance and regulations of:
Global Journal of Computer Science and Technology Volume 12 Issue 9 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationA REVIEW ON SECURE IDS AGAINST DDOS ATTACK PROBLEM IN MOBILE AD-HOC NETWORKS
A REVIEW ON SECURE IDS AGAINST DDOS ATTACK PROBLEM IN MOBILE AD-HOC NETWORKS Mr. Shantanu Deshmukh 1, Mr. Sagar Kaware 2 1Mr. Shantanu V. Deshmukh, IT Department, JDIET Yavatmal, shantanu5544@gmail.com
More informationComparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationSecure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,
More informationADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,
More informationSecure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
More informationIntrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
More informationTo Study the Various Attacks and Protocols in MANET
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationHow To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
More informationTema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationPerformance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
More informationISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationOPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
More informationModified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
More informationIII. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,
More informationAnalysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
More informationDefending against Path-based DoS Attacks in Wireless Sensor Networks
Defending against Path-based DoS Attacks in Wireless Sensor Networks Jing Deng, Richard Han, and Shivakant Mishra Department of Computer Science University of Colorado Boulder, Colorado, USA Jing.Deng@colorado.edu,
More informationSECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN
More informationKeywords Mobile Ad- Hoc network, fuzzy, dempster-shafer theory.
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Enhancing
More informationSECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK Paulraj*1, A.Syam Prasad*2 M.Tech (CSE) Student, Department of CSE, MRCET, Kompally, Hyderabad, A.P, India
More informationAttacks on neighbor discovery
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationEntropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More informationVampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
More informationAriadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationFair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationRobust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationSECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationSurvey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
More information