International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

In these days, randomly moving sensor networks are used for building up a application in all the areas like industrial, environmental, and medical and so on. There are some disadvantages of this network over the WSN, this network faces the problem regarding the security attack and they create clones of the nodes. They face this problem because of their dynamic nature. There are some solutions for noticing the attack of node replication. The sensor node generally does not assemble with tamper resistant hardware. This permits the circumstances where the competitor can easily compact the sensor node. There are number of approach are done for noticing node replication offense. The methods like localize algorithm, resisting node replication attack in mobile sensor networks. In this paper we introduced PKI based method for detecting node replication attack. This method improved the localized algorithm and settles the node attack. The proposed system consist of localize algorithm for detecting node replication attack and algorithm to protecting the node replication attack with less storage requirement, processing control and communication transparency.

Keywords: Mobile Sensor Network, Replica Attack, Node Security, Localized Algorithm, Public Key Infrastructure

Edition: Volume 3 Issue 7, July 2014

Pages: 1419 - 1424


How to Cite this Article?

Hemlata B Kadam, Rahul Kulkarni, "Detection of Node Replication Attack in MSN Based On PKI", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201412841, Volume 3 Issue 7, July 2014, 1419 - 1424

23 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Sensor Network'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2718 - 2722

Improving Target Coverage and Network Connectivity of Mobile Sensor Networks

Sonali Karegaonkar, Archana Raut

Share this article



Similar Articles with Keyword 'Replica Attack'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1892 - 1897

Detection of Node Replication Attack in Wireless Mobile Sensor Network Using Paillier

Snehal R. Rane, Sachin D. Babar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 185 - 189

A Modified Algorithm and Protocol for Replica Attack Prevention for Wireless Sensor Network

Dharmendra Singh Chouhan, Pritesh Jain

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 891 - 894

Reduction of Energy Consumption and Attack Prevention in Mobile Wireless Sensor Network: A Review

Ashe Kiran, Deepinder Dhaliwal

Share this article



Similar Articles with Keyword 'Localized Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 10, October 2013

Pages: 15 - 19

Randomized Geographic Routing with Guaranteed Delivery and Low Stretch

A. Felicia, K. Brindha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1892 - 1897

Detection of Node Replication Attack in Wireless Mobile Sensor Network Using Paillier

Snehal R. Rane, Sachin D. Babar

Share this article



Similar Articles with Keyword 'Public Key Infrastructure'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi, S. K. Srivatsa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 287 - 290

Public Key Encryption : A Survey

Banazir B

Share this article
Top