مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

353
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

73
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

IMNTV-Identifying Malicious Nodes Using Trust Value in Wireless Sensor Networks

Pages

  87-100

Abstract

 Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are Packet Dropping, Packet modification, Packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Swathi, b.h., Megha, v., Gururaj, h.l., Hamsaveni, m., & Janhavi, v.. (2018). IMNTV-Identifying Malicious Nodes Using Trust Value in Wireless Sensor Networks. JOURNAL OF ADVANCES IN COMPUTER ENGINEERING AND TECHNOLOGY, 4(2 (serial 14)), 87-100. SID. https://sid.ir/paper/346325/en

    Vancouver: Copy

    Swathi b.h., Megha v., Gururaj h.l., Hamsaveni m., Janhavi v.. IMNTV-Identifying Malicious Nodes Using Trust Value in Wireless Sensor Networks. JOURNAL OF ADVANCES IN COMPUTER ENGINEERING AND TECHNOLOGY[Internet]. 2018;4(2 (serial 14)):87-100. Available from: https://sid.ir/paper/346325/en

    IEEE: Copy

    b.h. Swathi, v. Megha, h.l. Gururaj, m. Hamsaveni, and v. Janhavi, “IMNTV-Identifying Malicious Nodes Using Trust Value in Wireless Sensor Networks,” JOURNAL OF ADVANCES IN COMPUTER ENGINEERING AND TECHNOLOGY, vol. 4, no. 2 (serial 14), pp. 87–100, 2018, [Online]. Available: https://sid.ir/paper/346325/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button