Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6890
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKothiyal, Adhishri-
dc.contributor.authorSingh, Yashwant [Guided by]-
dc.date.accessioned2022-09-27T07:04:20Z-
dc.date.available2022-09-27T07:04:20Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6890-
dc.description.abstractWSN are networks of small computing devices that can sense data and this data can be useful for some important job. WSN are used in many areas like battle surveillance, zebra monitoring system, sniper detection system and health monitoring systems. Since these networks susceptible to a variety of attacks, so it becomes necessary to secure these networks from such attacks. A central problem in Wireless Sensor Networks is that the nodes are susceptible to physical attacks. Once a sensor is compromised, attacker can easily launch a node clone attack by replicating the compromised nodes, distributing these in the network and then a variety of insider attacks can be launched. Previous works against the node clone attack suffer either from high communication cost or from poor detection accuracy. In this thesis, we are proposing a system that detects node clones assuming that WSN to be static and using a distributed scheme. The contribution of this paper is twofold. First, we studied the traditional methods for the node clone detection and discuss their drawbacks. Second, we implement an algorithm that will eliminate the drawbacks in the traditional schemes and prove its efficiency using simulations.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSensor networksen_US
dc.subjectNode clone attacken_US
dc.titleSecuring Wireless Sensor Networks from Node Clone Attacken_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Securing Wireless Sensor Networks from Node Clone Attack.pdf1.76 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.