توزیع و موثر و تصادفی توسعه یافته : یک تشخیص پویا از حمله های ابزار همگن در شبکه های حسگر بی سیم ایستا
EXTENDED-RANDOMIZED, EFFICIENT, DISTRIBUTED: A DYNAMIC DETECTION OF CLONE ATTACKS IN STATIC WIRELESS SENSOR NETWORKS
نویسندگان |
این بخش تنها برای اعضا قابل مشاهده است ورودعضویت |
اطلاعات مجله |
thescipub.com |
سال انتشار |
2014 |
فرمت فایل |
PDF |
کد مقاله |
24136 |
پس از پرداخت آنلاین، فوراً لینک دانلود مقاله به شما نمایش داده می شود.
چکیده (انگلیسی):
A wireless sensor network is a collection of nodes organized in to a cooperative network. Each node
consists of processing capability, multiple types of memory, a power source and actuators and sensors. This
wireless sensor network is established in hostile and harsh environments like civil and military applications.
This network is prone to various attacks. One of the major attack is clone attack. An adversary can capture
the node and replicate the node including its cryptographic information and deploy these nodes in the
network. This will lead to several problems like leaking the data, jamming the data flow, injecting false data
etc. The RED protocol determined the witness node using pseudo-randomly but it is purely static. This
study proposes eXtended-Randomized, Efficient, Distributed (X-RED), which detects clone nodes in the
static wireless sensor networks in a dynamically fast manner. It is a distributed protocol, which computes
the witness nodes dynamically. There is no pre-assumption in determining the witness node. We show that
the protocol satisfies the major requirements of the distributed algorithms like the witness node is selected
based on their id and location and also reduce the overhead. Simulation results show that our protocol is
more efficient than other exiting protocols in terms of detection probability. This approach gives
considerable amount of increase in detection probability than other existing protocols and also reduces the
storage overhead. This study can be extended for mobile wireless network in the future.
کلمات کلیدی مقاله (فارسی):
حملات ، تاييد هويت ، گره ابزار همگن ، تشخيص احتمال جهت حرکت ، تابع هش ، محل سکونت ، بي ربط ، گره ، ذخيره سازي هاي سقفي ، حسگر شبکه
کلمات کلیدی مقاله (انگلیسی):
Keywords: Attacks, Authentication, Clone Node, Detection Probability, Direction, Hash Function, Incoherent Location, Malicious Node, Storage Overhead, Wireless Sensor Network
پس از پرداخت آنلاین، فوراً لینک دانلود مقاله به شما نمایش داده می شود.