{"title":"Detection and mitigation of node replication with pulse delay attacks in wireless sensor network","authors":"S. Umrao, Deeksha Verma, A. Tripathi","doi":"10.1109/MITE.2013.6756374","DOIUrl":null,"url":null,"abstract":"Wireless sensor network (WSN) is made up two or more interconnected sensor nodes wirelessly. These nodes may be deployed either in open or closed environment. As these nodes communicates wirelessly and deployed in open environment there are always threat of security of nodes as well as data communicated. In order to making secure communication over WSN there should be some security mechanism. In this paper a common security mechanism is proposed to mitigate pulse delay attack and node replication. This mechanism includes detection and then mitigation.","PeriodicalId":284844,"journal":{"name":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MITE.2013.6756374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Wireless sensor network (WSN) is made up two or more interconnected sensor nodes wirelessly. These nodes may be deployed either in open or closed environment. As these nodes communicates wirelessly and deployed in open environment there are always threat of security of nodes as well as data communicated. In order to making secure communication over WSN there should be some security mechanism. In this paper a common security mechanism is proposed to mitigate pulse delay attack and node replication. This mechanism includes detection and then mitigation.