Low Cost Journal,International Peer Reviewed and Refereed Journals,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939) apply for ugc care approved journal, UGC Approved Journal, ugc approved journal, ugc approved list of journal, ugc care journal, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, Low cost research journal, Online international research journal, Peer-reviewed, and Refereed Journals, scholarly journals, impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed,Refereed, Indexed, Citation Open Access Journal)
ISSN: 2321-9939 | ESTD Year: 2013

Current Issue

Call For Papers
June 2023

Volume 11 | Issue 2
Last Date : 29 June 2023
Review Results: Within 12-20 Days

For Authors

Archives

Indexing Partner

Research Area

LICENSE

Paper Details
Paper Title
Effective Malicious Node Detection and Data Fusion under Byzantine Attacks.
Authors
  Shruti B.Hiregoudar,  Manjunath K

Abstract
Distributed systems are subject to a variety of failures and attacks. Many Web services are expected to run with high degree of security and dependability. As we all know that in wireless sensor network security is a major concern for protected communication between mobile nodes in a hostile environment. A serious threat to wireless sensor networks is the Byzantine attack , where the adversary has full control over some of the authenticated nodes and can perform arbitrary behavior to disrupt the system, were the attacker forwards packets through non –optimal paths or selectively dropping packets which results in disruption or degradation of routing services within the network. This paper explores effective malicious node detection and data fusion under byzantine attack by using distributed detection and checking probability condition in byzantine environment. The architecture consists of group of sensor nodes which will be sending data, a mobile access point which will periodically collect the data from sensor nodes and a sink which is used to store data sent by sensor nodes. Basically there are two types of attackers, static attracter and dynamic attracter. Static attacker, who always sends false data to sink & reverse information whenever data is requested. Dynamic attacker is attacker who sends both valid information and invalid information to sink. Hence the system gets confused weather it is a valid sensor or invalid sensor. Finally, we propose how malicious node can be detected and send only the valid data to fusion center under byzantine attack.

Keywords- Sensor networks, distributed detection, Byzantine attack.
Publication Details
Unique Identification Number - IJEDR1702112
Page Number(s) - 659-662
Pubished in - Volume 5 | Issue 2 | April 2017
DOI (Digital Object Identifier) -   
Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Shruti B.Hiregoudar,  Manjunath K,   "Effective Malicious Node Detection and Data Fusion under Byzantine Attacks.", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.5, Issue 2, pp.659-662, April 2017, Available at :http://www.ijedr.org/papers/IJEDR1702112.pdf
Share This Article


Article Preview

ISSN Details




DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

Our Social Link

© Copyright 2024 IJEDR.ORG All rights reserved