Escolar Documentos
Profissional Documentos
Cultura Documentos
ABSTRACT
One of the research issues in Wireless Sensor Networks
(WSNs) is how to efficiently organize sensors to cover
an area. A byzantine attack in wireless SEnsor Networks
with Mobile Access (SENMA) points is deliberated. One
effective method to fight with Byzantine attacks is the qout-of-m scheme. Byzantine sensors that reduce the
detection error exponent are achieved using a WaterFilling procedure. To show that for a fixed proportion
of malicious sensors, the detection precision of the
simplified q-out-of-m scheme increases almost
exponentially as the network size increases. A
distributed scheme is designed to attain, preserve, and
update trust records associated with the behaviours of
nodes forwarding packets and the activities of making
recommendations about other nodes. It has been
assumed that the local sensors detection acts, namely
either the local sensors Signal-to-Noise Ratios (SNRs)
or their probabilities of detection and false alarm.
KEYWORDS- SENMA, Water-filling,
scheme, Signal-to-Noise Ratio.
I.
q-out-of-m
INTRODUCTION
www.ijsret.org
202
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
II.
LITERATURE SURVEY
www.ijsret.org
203
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
III.
CONCLUSION
IV.
FUTURE WORK
REFERENCE
[1] Bharathidasas and V. Anand, Sensor networks: An
overview, Technical report, Dept. of Computer Science,
University of California at Davis, 2002.
[2] Chong and S. Kumar, Sensor networks: evolution,
opportunities, and challenges, Proceedings of the IEEE,
vol. 91, no. 8, pp. 1247 2056, aug. 2003.
[3] Karlof, N. Sastry, and D. Wagner, Tinysec: a link
layer security architecture for wireless sensor networks,
in Proceedings of the 2nd international conference on
Embedded networked sensor systems, ser. SenSys 04.
New York, NY, USA: ACM, 2004, pp. 162175.
[Online].
Available:
http://doi.acm.org/10.1145/1031495.1031515
[4] L. Tong, Q. Zhao, and S. Adireddy, Sensor
networks with mobile agents, in Military
Communications Conference, MILCOM 2003, IEEE,
vol. 1, oct. 2003, pp. 688 693.
[5] S. Marano, V. Matta, and L. Tong, Distributed
detection in the presence of byzantine attack in large
wireless sensor networks, in Military Communications
Conference, MILCOM 2006, IEEE, oct. 2006, pp. 14.
[6] S. Marano, V. Matta, and L. Tong, Distributed
Detection in the Presence of Byzantine Attacks, IEEE
Trans. Signal Processing, vol. 57, no. 1, pp. 16-29, Jan.
2009.
[7] G. Mergen, Z. Qing, and L. Tong, Sensor Networks
with Mobile Access: Energy and Capacity
Considerations, IEEE Trans. Comm., vol. 54, no. 11,
pp. 2033-2044, Nov. 2006.
[8] B. Awerbuch, R. Curtmola, H. D., N.-R. C., and R.
H., Mitigating byzantine attacks in ad hoc wireless
networks, Technical report version 1, mar. 2004.
[9] M. Abdelhakim, L. Lightfoot, and T. Li, Reliable
Data Fusion in Wireless Sensor Networks under
Byzantine Attacks, Proc. IEEE Military Comm. Conf.,
Nov. 2011.
[10] L. Lamport, R. Shostak, and M. Pease, The
Byzantine generals problem, ACM Trans. Program.
Languages Syst., vol. 4, pp. 382401, Jul. 1982.
[11] D. Dolev, The Byzantine generals strike again, J.
Algorithms, vol. 3, no. 1, pp. 1430, 1982.
[12] B. Pfitzmann and M.Waidner, Information
Theoretic Pseudo signatures and Byzantine Agreement
for t>= n/3 1996, IBM Research Report, Tech. Rep.
RZ2882.
[13] R. Niu, P. K. Varshney, and Q. Cheng, Distributed
detection in a large wireless sensor network, Int. J. Inf.
Fusion, vol. 7, no. 4, pp. 380394, Dec. 2006.
www.ijsret.org
204
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
AUTHORS BIOGRAPHY
www.ijsret.org
205