Survey on Malicious Node Detection and Reliable Data Fusion in MANET

Download Now
Provided by: International Journal of Scientific Research Engineering &Technology (IJSRET)
Topic: Mobility
Format: PDF
One of the research issues in Wireless Sensor Networks (WSNs) is how to efficiently organize sensors to cover an area. A byzantine attack in wireless SEnsor Networks with Mobile Access (SENMA) points is deliberated. One effective method to fight with Byzantine attacks is the q-out-of-m scheme. Byzantine sensors that reduce the detection error exponent are achieved using a "Water-filling" procedure. To show that for a fixed proportion of malicious sensors, the detection precision of the simplified q-out-of-m scheme increases almost exponentially as the network size increases.
Download Now

Find By Topic