Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm

R. Ramalakshmi, S. Subash Prabhu, C. Balasubramanian

Abstract


The sensor network is used to observe surrounding area gathered and spread the information to other sink. The advantage of this network is used to improve life time and energy. The first sensor node or group of sensor nodes in the network runs out of energy. The aggregator node can send aggregate value to the base station. The sensor node can be used to assign initial weights for each node. This sensor node calculates weight for each node. Which sensor node weight should be lowest amount they can act as a cluster head. The joint node can send false data to the aggregator node and then these node controls to adversary. The dependability at any given instant represents an comprehensive behavior of participate to be various types of defects and misconduct. The adversary can send information to aggregator node then complexity will be occurred. These nodes are used to reduce the energy and band width.


Full Text:

PDF

References


H.S. Lim, E.Bertino And M.Kantarcioglu, “A Game Theoretic Approach For High Assurance Of Data Trustworthiness In Sensor Networks,” In Pro.IEEE 28th Int. Conf Data Eng., Apr 2012.

Y. Yu “Trust Mechanisms In Wireless Sensor Networks: Attack Analysis And Countermeasures,”J. Netw. Compute. Appl.Vol. 35, 2012

L. Shi, K. M. Hou, H. Ying Zhou, And X. Liu, “Energy Efficient And Fault Tolerant Multicore Wireless Sensor Network: EMWSN,”In Proc. 7th Int.Conf. Wireless Commun, Netw. Mobile Compute, 2011, Pp. 1–4.

C. De Kerchove And P. Van Dooren, “Iterative Filtering In Reputation Systems,” SIAM J. Matrix Anal. Appl., Vol. 31, No. 4, Pp. 1812, 1834, Mar, 2010.

S.Ozdemir and Y. Xiao, “Secure Data Aggregation In Wireless Sensor Networks: A Comprehensive Overview,” Comput. Netw.Vol. 53, No. 12, Pp. 2022–2037, Aug. 2009.

A. Jøsang And J. Golbeck, “Challenges For Robust Trust And Reputa-Tion Systems,” In Proc. 5th Int. Workshop Security Trust Manage., Saint Malo, France, 2009, Pp. 253–262.

R.Roman, C. Fernandez- Gago, J. Lopez,“Trust And Reputation Systems For Wireless Sensor Networks,” In Security And Privacy In Mobile And Wireless Networking, S.Gritzalis, T. Karygiannis, U.K: Troubador Publishing Ltd, 2009 Pp. 105–128.

K. Hoffman,“A Survey Of Attack And Defense Techniques For Reputation Systems,” ACM Compute. Surveys, Vol. 42, No. 1, Pp. 1:1–1:31, Dec. 2009.

E.Ayday, H. Lee, And F.Fekri, “An Iterative Algorithm For Trust And Reputation Management,”Proc. IEEE Int. Conf.Symp. Inf. Theory, Vol. 3, 2009, Pp. 2051–2055.

P.Laureti,Y.-C. Zhang, And Y.-K. Yu, “Information Filtering Via Iterative Refinement,” Europhys. Lett, Vol. 75, Pp. 1006–1012, Sep. 2009.




DOI: https://doi.org/10.11591/APTIKOM.J.CSIT.122

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 APTIKOM Journal on Computer Science and Information Technologies



ISSN: 2722-323X, e-ISSN: 2722-3221

CSIT Stats

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.