This paper proposes a strategy based on processor utilization value provided by each sensor node of the network for detecting their malicious activities by comparing the node's present processor utilization value with the old estimated value . If the difference between the two values is higher or less than the expected value then that particular node become suspicious. A knowledge based system can take decision to expel the malicious node from the network topology
CITATION STYLE
Sharma, D. (2012). Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization. International Journal of Computer Applications, 50(14), 40–46. https://doi.org/10.5120/7843-1101
Mendeley helps you to discover research relevant for your work.