A VIBRANT STRUCTURE FOR IDENTIFYING MALICIOUS NODES IN UNWIRED NETS

N. Sainath, Challa Mounika

Abstract


In the present occasions, recent has highlighted the important thing contribution of attribution within systems where utilization of difficult to depend on data could cause disastrous failures. Attribution is going to be monitored for every packet, however essential challenges will arise because of fixed storage, energy additionally to bandwidth limits of sensor nodes consequently, you should produce a light-weight attribution solution by means of low overhead. You need to deal with security needs for instance privacy, reliability additionally to originality of attribution and our goal is always to devise an attribution encoding additionally to deciphering means by which assures protection additionally to performance needs. Inside our work we advise a completely new lightweight method of strongly convey attribution for sensor data. The recommended method is dependent upon in-packet Blossom filters to correct attribution. Blossom filters make well-organized utilization of bandwidth, additionally to yield small error rates used.


Keywords


Attribution; Lightweight Method; Encoding; Sensor Nodes; Bandwidth; Bloom Filters; Security;

References


S. Madden, J. Franklin, J. Hellerstein, and W. Hong, “TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks,” ACM SIGOPS Operating Systems Rev., vol. 36, no. SI, pp. 131-146, Dec. 2002.

K. Dasgupta, K. Kalpakis, and P. Namjoshi, “An Efficient Clustering Based Heuristic for Data Gathering and Aggregation in Sensor Networks,” Proc. Wireless Comm. and Networking Conf., pp. 1948- 1953, 2003.

S. Sultana, E. Bertino, and M. Shehab, “A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks,” Proc. Int’l Conf. Distributed Computing Systems (ICDCS) Workshops, pp. 332-338, 2011.

S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Int’l Conf. Mobile Computing and Networking, pp. 255-265, 2000.

S. Papadopoulos, A. Kiayias, and D. Papadias, “Secure and Efficient In-Network Processing of Exact Sum Queries,” Proc. Int’l Conf. Data Eng., pp. 517-528, 2011.

A. Liu and P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” Proc. Seventh Int’l Conf. Information Processing in Sensor Networks (IPSN), pp. 245-256, 2008.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.