Shabnam Kumari - Academia.edu (original) (raw)

Shabnam Kumari

Related Authors

James Phelan

Frederick A. De Armas

Frederik Van Dam

Emilio Sauri

Viacheslav Kuleshov

Vítor Costa

Vítor Costa

UERJ - Universidade do Estado do Rio de Janeiro / Rio de Janeiro State University

Atif  El Naggar

Shami Bakhiet

Jana  Javornik

Gwen Robbins Schug

Uploads

Papers by Shabnam Kumari

Research paper thumbnail of Malicious Node Detection in WSN Using WTE

International Journal of Trend in Scientific Research and Development, 2018

Since WSNs are used in missionsecurity is an essential requirement. Sensor nodes can easily be co... more Since WSNs are used in missionsecurity is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the network's operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malic both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability.

Research paper thumbnail of A Study on Security in Wireless Sensor Networks

International Journal of Trend in Scientific Research and Development, 2018

Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futur... more Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy efficient computing devices and algorithms for WSN but the most challenging is to fit the security of WSN into that strained environment. However, security is crucial to the success of applying WSN. So it becomes essential to be familiar with the security aspects of WSN before designing WSN system. When sensor networks are deployed in an aggressive terrain, security becomes extremely important, as they are prone to different types of despite attacks. The intent of this paper is to investigate security problems and various security requirements. We identify the attacks at all the layers of WSN network architecture and also tried to find their possible solution.

Research paper thumbnail of Shortest Hop Multi-Path Algorithm For WSN

Wireless S ensor Networks (WS Ns) are a research theme alluring over the recent years because of ... more Wireless S ensor Networks (WS Ns) are a research theme alluring over the recent years because of its ample applications. WS Ns are a set of wireless embedded devices which have the ability of processing and communicating video and audio streams collected from the environment in a distributed fashion. This work presents a Dijkstra's algorithm to figure out the shortest path between the source node and destination node with lower cost. Emanating on the multidimensional scaling (MDS) technique the node locations can be procured to fit the approximate distances between pairs of nodes. It uses the S hortest Path Position Estimation between S ource and Destination nodes in Wireless S ensor Networks with Lower Cost.

Research paper thumbnail of REST based API

International Journal of Trend in Scientific Research and Development, 2017

Research paper thumbnail of Malicious Node Detection in WSN Using WTE

International Journal of Trend in Scientific Research and Development, 2018

Since WSNs are used in missionsecurity is an essential requirement. Sensor nodes can easily be co... more Since WSNs are used in missionsecurity is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the network's operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malic both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability.

Research paper thumbnail of A Study on Security in Wireless Sensor Networks

International Journal of Trend in Scientific Research and Development, 2018

Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futur... more Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy efficient computing devices and algorithms for WSN but the most challenging is to fit the security of WSN into that strained environment. However, security is crucial to the success of applying WSN. So it becomes essential to be familiar with the security aspects of WSN before designing WSN system. When sensor networks are deployed in an aggressive terrain, security becomes extremely important, as they are prone to different types of despite attacks. The intent of this paper is to investigate security problems and various security requirements. We identify the attacks at all the layers of WSN network architecture and also tried to find their possible solution.

Research paper thumbnail of Shortest Hop Multi-Path Algorithm For WSN

Wireless S ensor Networks (WS Ns) are a research theme alluring over the recent years because of ... more Wireless S ensor Networks (WS Ns) are a research theme alluring over the recent years because of its ample applications. WS Ns are a set of wireless embedded devices which have the ability of processing and communicating video and audio streams collected from the environment in a distributed fashion. This work presents a Dijkstra's algorithm to figure out the shortest path between the source node and destination node with lower cost. Emanating on the multidimensional scaling (MDS) technique the node locations can be procured to fit the approximate distances between pairs of nodes. It uses the S hortest Path Position Estimation between S ource and Destination nodes in Wireless S ensor Networks with Lower Cost.

Research paper thumbnail of REST based API

International Journal of Trend in Scientific Research and Development, 2017

Log In