Simulation Based on an Effective Defence Against Duplicate Node Attacks in Wireless Networks

To achieve an efficient and effective approach to find out the duplicate node attacks in the wireless sensor networks still must be a challenge. Attacker, the user can capture the node form the network and compromise over the network. Attacker he captured any node from the network by using the tamper resistant hardware's. Adversary can injects fake data into the network with the help of that captured node. And also from the captured node he identifies its ID and key first of all.

Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE) Topic: Mobility Date Added: Jan 2012 Format: PDF

Download Now

Find By Topic