TODOS los libros importados con 50% dcto  Ver más

menú

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada A Defense Mechanism Against Clone Wars in Hierarchical Based Wireless Sensor Networks: Clone Wars in wsn (en Inglés)
Formato
Libro Físico
Año
2018
Idioma
Inglés
N° páginas
66
Encuadernación
Tapa Blanda
ISBN13
9781726855662
Categorías

A Defense Mechanism Against Clone Wars in Hierarchical Based Wireless Sensor Networks: Clone Wars in wsn (en Inglés)

Kamaljit Singh Saini & Rubal Grewal . (Autor) · Independently Published · Tapa Blanda

A Defense Mechanism Against Clone Wars in Hierarchical Based Wireless Sensor Networks: Clone Wars in wsn (en Inglés) - Kamaljit Singh Saini & Rubal Grewal .

Libro Nuevo

$ 78.984

$ 157.969

Ahorras: $ 78.984

50% descuento
  • Estado: Nuevo
  • Quedan 100+ unidades
Origen: Estados Unidos (Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el Lunes 22 de Julio y el Miércoles 31 de Julio.
Lo recibirás en cualquier lugar de Colombia entre 1 y 5 días hábiles luego del envío.

Reseña del libro "A Defense Mechanism Against Clone Wars in Hierarchical Based Wireless Sensor Networks: Clone Wars in wsn (en Inglés)"

Due to open deployment of sensor nodes in hostile environment and lack of physical shielding, sensor networks are exposed to different types of physical threats including Clone attack where an adversary physically captures a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network. If no specific detection mechanism is employed then the network is vulnerable to many insidious attacks such as signal jamming, insert false information, cluster reformation and network monitoring that challenge the sensor applications.In this thesis, a defense mechanism against replicated nodes is proposed to improve the security of the wireless sensor networks. The scheme is based on the use of location information and identity of each node which is collected by each cluster head from the cluster member nodes. A cluster head maintains a list of all the members present in the cluster including node Id and location. Each cluster head transmits the information (list) to the BS that detects the presence of clone nodes in the network. Thus our proposal is a centralized approach in which central trusted party (BS) is responsible for detection of the clone nodes. The approach also revokes the clone nodes, so that legitimate nodes stops communication with the malicious nods inserted in this manner.The proposed scheme allows the replicated nodes to enter into the network until the location conflict arises. If there is a mismatch occurs in any of the nodes present in the network then the communication with the suspected nodes become blocking mode and raise the revocation procedure by the base station.An analysis has been done on the proposed scheme to measure its effectiveness in the network. The performance of the proposed method is measured by calculating the parameters like detection time and detection probability.

Opiniones del libro

Ver más opiniones de clientes
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Preguntas frecuentes sobre el libro

Todos los libros de nuestro catálogo son Originales.
El libro está escrito en Inglés.
La encuadernación de esta edición es Tapa Blanda.

Preguntas y respuestas sobre el libro

¿Tienes una pregunta sobre el libro? Inicia sesión para poder agregar tu propia pregunta.

Opiniones sobre Buscalibre

Ver más opiniones de clientes