Low Cost Journal,International Peer Reviewed and Refereed Journals,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939)
apply for ugc care approved journal, UGC Approved Journal, ugc approved journal, ugc approved list of journal, ugc care journal, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020,
Low cost research journal, Online international research journal, Peer-reviewed, and Refereed Journals, scholarly journals, impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool)
Effective Malicious Node Detection and Data Fusion under Byzantine Attacks.
Shruti B.Hiregoudar,  Manjunath K
Distributed systems are subject to a variety of failures and attacks. Many Web services are expected to run with high degree of security and dependability. As we all know that in wireless sensor network security is a major concern for protected communication between mobile nodes in a hostile environment. A serious threat to wireless sensor networks is the Byzantine attack , where the adversary has full control over some of the authenticated nodes and can perform arbitrary behavior to disrupt the system, were the attacker forwards packets through non –optimal paths or selectively dropping packets which results in disruption or degradation of routing services within the network. This paper explores effective malicious node detection and data fusion under byzantine attack by using distributed detection and checking probability condition in byzantine environment. The architecture consists of group of sensor nodes which will be sending data, a mobile access point which will periodically collect the data from sensor nodes and a sink which is used to store data sent by sensor nodes. Basically there are two types of attackers, static attracter and dynamic attracter. Static attacker, who always sends false data to sink & reverse information whenever data is requested. Dynamic attacker is attacker who sends both valid information and invalid information to sink. Hence the system gets confused weather it is a valid sensor or invalid sensor. Finally, we propose how malicious node can be detected and send only the valid data to fusion center under byzantine attack.
Keywords- Sensor networks, distributed detection, Byzantine attack.
Unique Identification Number - IJEDR1702112Page Number(s) - 659-662Pubished in - Volume 5 | Issue 2 | April 2017DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
Shruti B.Hiregoudar,  Manjunath K,   "Effective Malicious Node Detection and Data Fusion under Byzantine Attacks."
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.5, Issue 2, pp.659-662, April 2017, Available at :http://www.ijedr.org/papers/IJEDR1702112.pdf