Imposter detection for replication attacks in mobile sensor networks and reallocating the IDS

Gurwinder Kaur

Imposter detection for replication attacks in mobile sensor networks and reallocating the IDS

Keywords : Imposter, IDS.


Abstract

A wireless sensor network is the wireless network where large number of wireless nodes communicates to each other. These nodes either are moving or can be stationary. While moving and remain stationary they communicate to the environment. Collects the data like temperature, humidity, or soil humidity contents etc. Collected data will be sent to the base station. Which further processes the data? While setting the network and while communicating in the network various malicious nodes exists. These nodes can copy the characteristics of other legitimate node, this type of node is called as imposter node. Any routed packet from source towards the node with same id will get dropped by the imposter node. Such that packet loss will be taken place. This in results deteriorate the performance of the network. While identifying the imposter and removing the imposter node from the network, so that node performance should not be hampered. In both the situation the performance has been checked on the basis of various parameters like packet delivery rate, success rate, end to end delay etc. these various performance parameters has shown the improvement. Such that more packet has been transferred and there is more success rate for packets to reach the destination. These factors have been improved due to detection and removal of imposter nodes.

Download



Comments
No have any comment !
Leave a Comment