IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Subject Areas : Network SecuritySwathi B H 1 , Megha V 2 , Gururaj H L 3 , Hamsaveni M 4 , Janhavi V 5
1 - Vidyavardhaka College of Engineering
2 - Vidyavardhaka College of Engineering
3 - Vidyavardhaka College of Engineering
4 - Vidyavardhaka College of Engineering
5 - Vidyavardhaka College of Engineering
Keywords:
Abstract :
[1]. GhazalehTahandowt, FatehmanGhasseuri, An adaptive sinkhole algorithm in wireless neural networks- Elsevier2017.
[2]. A.R Dhalene and P.N Chatur, Detailed Survey on attacks in wireless sensor network, Proceedings of the International conference on data engineering and communication technology. Advances in Intelligent systems and computing 469, 2017.
[3].BharathBhushan, Gadharsahoo, Recent advances in attacks, Technical challenges, Vulnerabilities and their countermeasures in Wireless sensor networks, 2017.
[4].Noor Alsaedi, Fazirul Hisyam Hashim, A.Sali, Fakheul Z Rokhani- Detecting Sybil attacks in clustered wireless sensor network based on energy test system(ETS)- Elsevier 2017.
[5] PrathapU,Deepa ShenoyP,Venugopal K P,"CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks",IEEE Region 10 symposium ,December 2016
[6] PrathapU,DeepaShenoyP,Venugopal K P,"CPMTS:Catching Packet Modifiers with Trust Support in Wireless Sensor Networks",IEEE International WIE Conference on Electronical and Computer Engineering, December 2015.
[7] Nirupama A.S., Ch.VijayaBhaskar and Sudarson Jena, An Efficient Protocol to Identify Packet Droppers and Modifiers to Improve QoS in Wireless Sensor Network(WSN) IEEE ICCSP conference 2015.
[8] Chuang W, Taiming F, Jinsook K, Guiling W, and Wensheng Z, ”Catching Packet Droppers and Modifiers in Wireless Sensor Networks,” In IEEE Transactions on Parallel and DistributedSystems, volume 23, pages 835–843, May 2012.
[9] Issa M. Khalil, ”ELMO: Energy Aware Local Monitoring inSensor Networks,” In IEEE Transactions on dependable andsecure computing, volume 8, pages 523–536, August 2011.
[10] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, ”SECMRa Secure Multipath Routing Protocol for Ad Hoc Networks,” In Ad Hoc Networks, volume 5, pages 87–99, 2007.
[11] M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, ”Misbehavior Resilient Multi-Path Data Transmission in Mobile Ad-Hoc Networks,” In Proc. Fourth ACM Workshop Security ofAd Hoc and Sensor Networks (SASN 06), 2006.
[12] V. Bhuse, A. Gupta, and L. Lilien, ”DPDSN: Detection of Packet-Dropping Attacks for Wireless Sensor Networks,” In Proc. Fourth Trusted Internet Workshop, 2005.
[13] F. Ye, H. Luo, S. Lu, and L. Zhang, ”Statistical En-Route Filtering of Injected False Data in Sensor Networks,” In Proc.IEEE INFOCOM,, 2004.
[14] S. Zhu, S. Setia, S. Jajodia, and P. Ning, ”An Interleaved Hopby- Hop Authentication Scheme for Filtering False Data in Sensor Networks,” In Proc. IEEE Symp. Security and Privacy, 2004.
[15] H. Chan and A. Perrig, ”Security and Privacy in Sensor Networks,” In Computer, volume 36, pages 103–105, Oct 2003.
[16] C. Karlof and D. Wagner, ”Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” In Proc. IEEE FirstIntl Workshop Sensor Network Protocols and Applications, 2003.