TAILIEUCHUNG - MadCD: A mobile agent based distributed clone detection method in mobile WSNs

In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 7, JULY 2014, 225–231 Available online at: ISSN 2308-9830 N C S MadCD: A Mobile Agent Based Distributed Clone Detection Method in Mobile WSNs SEPIDE MORADI1 and MINA ZOLFY LIGHVAN2 1, 2 Department of Electrical and Computer Engineering, Tabriz University, Tabriz, Iran E-mail: 2mzolfy@ ABSTRACT Sensor nodes used in enemy environments are disposed to capture and Compromise. An adversary may obtain secret information from sensors, such attack is named as clone attack. The clone attack, Replicate nodes and arrange them in the network to launch a variety of other attacks. In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of researchists use mobile agents as a novel template for distributed purpose to dominate the limitations of sensor nodes. Recently, several solutions are proposed to tackle clone attacks, but they mostly suffer from high overhead. In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead. Keywords: Wireless sensor networks, Clone attack, Clone detection, Mobile agent, location. 1 INTRODUCTION Wireless sensor networks are gradually becomes a proper solution for a wide area of real world monitoring problems. These networks are typically organized in uncontrollable and usually not reliable environments. Almost all sensor networks are physically reachable and thus more vulnerable. An attacker may capture and compromise a node and control a valid member of the network. The clone attack is the basis of a range of

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.