Recognition of Risky Attacks in Wireless Sensor Networks

Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Enterprise Software
Format: PDF
Wi-Fi indicator systems are vulnerable to the node replicated and several distribute methods have been suggested to identify this attack. However, two novel nodes replicated discovering methods with different tradeoffs on system conditions and efficiency. The first one is depending on a allocated Distributed Hash Table (DHT), by which a fully decentralized, key-based caching and verifying system is designed to capture duplicated nodes effectively. The method efficiency on efficient storage spending and great security level is apparently subtracted through a possibility model and the causing equations, with necessary improvements for real application, are reinforced by the models.

Find By Topic