J. Shirisha, M. Rajkumar, D. Sangeetha, R. Sabitha, B. Kannan, S. Renukadevi
{"title":"移动无线传感器网络中发现重复攻击的椭圆曲线差分-赫尔曼算法","authors":"J. Shirisha, M. Rajkumar, D. Sangeetha, R. Sabitha, B. Kannan, S. Renukadevi","doi":"10.1109/ICCPC55978.2022.10072042","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Network (WSN) is the greatest susceptible of all the wireless sensor nodes. In the WSN, several widespread attacks were launched in the rival world. The most problematic are complete attack identification and avoidance of node duplication. The period it takes to recognize and separate a duplicated sensor node is typically higher than other attack recognition methods owing to the related identity and features copied through the attacker. Elliptical Curve Diffe-Hellman Algorithm is employed for discovering duplication attack (ECDD) in Mobile WSN. This approach aims to distinguish duplicated sensor nodes in the mobile WSN. In this approach, the public and private keys are used for verification. The ECDD method interacts with the secret key to distinguish the duplicate sensor node and separate it from routing, raising the network function. The simulation examination demonstrates a lesser false negative ratio and increases duplicate attack detection in the network.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Elliptical Curve Diffe-Hellman Algorithm for discovering Duplication Attack in Mobile WSN\",\"authors\":\"J. Shirisha, M. Rajkumar, D. Sangeetha, R. Sabitha, B. Kannan, S. Renukadevi\",\"doi\":\"10.1109/ICCPC55978.2022.10072042\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Network (WSN) is the greatest susceptible of all the wireless sensor nodes. In the WSN, several widespread attacks were launched in the rival world. The most problematic are complete attack identification and avoidance of node duplication. The period it takes to recognize and separate a duplicated sensor node is typically higher than other attack recognition methods owing to the related identity and features copied through the attacker. Elliptical Curve Diffe-Hellman Algorithm is employed for discovering duplication attack (ECDD) in Mobile WSN. This approach aims to distinguish duplicated sensor nodes in the mobile WSN. In this approach, the public and private keys are used for verification. The ECDD method interacts with the secret key to distinguish the duplicate sensor node and separate it from routing, raising the network function. The simulation examination demonstrates a lesser false negative ratio and increases duplicate attack detection in the network.\",\"PeriodicalId\":367848,\"journal\":{\"name\":\"2022 International Conference on Computer, Power and Communications (ICCPC)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Computer, Power and Communications (ICCPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPC55978.2022.10072042\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computer, Power and Communications (ICCPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPC55978.2022.10072042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Elliptical Curve Diffe-Hellman Algorithm for discovering Duplication Attack in Mobile WSN
Wireless Sensor Network (WSN) is the greatest susceptible of all the wireless sensor nodes. In the WSN, several widespread attacks were launched in the rival world. The most problematic are complete attack identification and avoidance of node duplication. The period it takes to recognize and separate a duplicated sensor node is typically higher than other attack recognition methods owing to the related identity and features copied through the attacker. Elliptical Curve Diffe-Hellman Algorithm is employed for discovering duplication attack (ECDD) in Mobile WSN. This approach aims to distinguish duplicated sensor nodes in the mobile WSN. In this approach, the public and private keys are used for verification. The ECDD method interacts with the secret key to distinguish the duplicate sensor node and separate it from routing, raising the network function. The simulation examination demonstrates a lesser false negative ratio and increases duplicate attack detection in the network.