Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization

  • Sharma D
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

This paper proposes a strategy based on processor utilization value provided by each sensor node of the network for detecting their malicious activities by comparing the node's present processor utilization value with the old estimated value . If the difference between the two values is higher or less than the expected value then that particular node become suspicious. A knowledge based system can take decision to expel the malicious node from the network topology

Cite

CITATION STYLE

APA

Sharma, D. (2012). Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization. International Journal of Computer Applications, 50(14), 40–46. https://doi.org/10.5120/7843-1101

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free