首页> 外文期刊>Indian Journal of Science and Technology >Detecting Node Masquerade Attack using RLE Method
【24h】

Detecting Node Masquerade Attack using RLE Method

机译:使用RLE方法检测节点化妆舞会攻击

获取原文
获取外文期刊封面目录资料

摘要

Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we propose a method named as Detecting Node Masquerade Attack using RLE Method which is used for detecting a clone in the network using RLE method. The main goal of our proposed protocol is to detect the replica of the nodes i.e. clones in the network on the basis of RLE method. RLE method is abbreviated as RSSI and List Exchange method i.e. R represents RSSI means received signal strength indicator. After that we also compare our proposed protocol with the known method i.e. Hip-Hop protocols which are also used to find a clone in mobile WSN and our simulation shows that our proposed protocol outperforms the existing approach in terms of detection rate and time taken to detect a clone. In future work, we can also use a clustering protocol to make this work more efficient.
机译:在移动无线传感器网络提出的安全挑战中,克隆攻击尤其可怕,因为克隆攻击者仅利用一些先前受损的传感器的复制品就可以破坏网络的行为。在这项工作中,我们提出了一种称为“使用RLE方法检测节点化妆舞会攻击”的方法,该方法用于使用RLE方法检测网络中的克隆。我们提出的协议的主要目标是基于RLE方法检测节点的副本,即网络中的克隆。 RLE方法缩写为RSSI和列表交换方法,即R表示RSSI表示接收信号强度指示符。之后,我们还将提议的协议与已知的方法(即Hip-Hop协议)进行了比较,该协议也可用于在移动WSN中查找克隆,并且我们的仿真显示,在检测率和检测时间方面,我们提出的协议优于现有方法一个克隆。在以后的工作中,我们还可以使用群集协议来提高这项工作的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号