International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 314

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.7 / 10


     

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni


Abstract: In these days, randomly moving sensor networks are used for building up a application in all the areas like industrial, environmental, and medical and so on. There are some disadvantages of this network over the WSN, this network faces the problem regarding the security attack and they create clones of the nodes. They face this problem because of their dynamic nature. There are some solutions for noticing the attack of node replication. The sensor node generally does not assemble with tamper resistant hardware. This permits the circumstances where the competitor can easily compact the sensor node. There are number of approach are done for noticing node replication offense. The methods like localize algorithm, resisting node replication attack in mobile sensor networks. In this paper we introduced PKI based method for detecting node replication attack. This method improved the localized algorithm and settles the node attack. The proposed system consist of localize algorithm for detecting node replication attack and algorithm to protecting the node replication attack with less storage requirement, processing control and communication transparency.


Keywords: Mobile Sensor Network, Replica Attack, Node Security, Localized Algorithm, Public Key Infrastructure


Edition: Volume 3 Issue 7, July 2014


Pages: 1419 - 1424



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Hemlata B Kadam, Rahul Kulkarni, "Detection of Node Replication Attack in MSN Based On PKI", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1419-1424, https://www.ijsr.net/getabstract.php?paperid=201412841, DOI: https://www.doi.org/10.21275/201412841



Similar Articles

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2718 - 2722

Improving Target Coverage and Network Connectivity of Mobile Sensor Networks

Sonali Karegaonkar, Archana Raut

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1629 - 1631

Survey on Phenomenon Mobility Prediction using Virtual Force-based Interest Driven Monitoring Scheme

Rakhi Narkhede, Prof. L. H. Patil, Prof. U. K. Thakur

Share this Article
Top