Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security

2016 ◽  
Vol 94 (3) ◽  
pp. 1799-1824
Author(s):  
Hind Idrissi
Author(s):  
Ambika N.

Wireless sensor nodes are low cost tiny devices deployed in unsupervised environment. These devices require some kind of security mechanism to tackle different kinds of attacks. Intrusion detection is one such methodology used where the malicious activity is observed, and the target is isolated. Many authors have suggested different methodologies which are detailed in the work. The article also uses intrusion detection scheme to provide reliable network. A mobile agent and an assistance node aids in increasing security and efficiency of the work. The illegitimacy of the node is inferred using the data provided by the assistance and mobile agent. The work minimizes 12.9% of energy consumption, increases security by 3.025%, and increases reliability by 7.07% compared to the previous work.


Author(s):  
SHUCHENG XIAO ◽  
JIANPING LI ◽  
GANG ZHAO ◽  
QIU SHAN

Sign in / Sign up

Export Citation Format

Share Document