首页    期刊浏览 2024年10月07日 星期一
登录注册

文章基本信息

  • 标题:A Strategic Approach for Bypassing the Intruder and Sending Data to Destination using Three – Tier Framework in Sensor Networks
  • 本地全文:下载
  • 作者:Veera RaghavaRao Atukuri ; Venkata Pavani S ; Vasanthi B
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2012
  • 卷号:3
  • 期号:2
  • 页码:3754-3756
  • 出版社:TechScience Publications
  • 摘要:In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. Often There is solution to find and detect the intruder in sensor network using a three-tier framework, consisting of a verifiable intruder reporting (VIR) scheme, a quorum based caching (QBC) scheme for efficiently propagating intruder reports to the whole network, and a collaborative Bloom Filter (CBF) scheme for handling intruder information locally. Which is useful only to find the attacker in the network and if there is an attacker we didn’t sent the data..In this paper, we propose a bypassing the data when the intruder is attacked in the sensor network. By using these three schemes and finding the different routes in the network and send the data to destination.
国家哲学社会科学文献中心版权所有