International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 50 - Issue 14 |
Published: July 2012 |
Authors: Deepak Sharma |
![]() |
Deepak Sharma . Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization. International Journal of Computer Applications. 50, 14 (July 2012), 40-46. DOI=10.5120/7843-1101
@article{ 10.5120/7843-1101, author = { Deepak Sharma }, title = { Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 50 }, number = { 14 }, pages = { 40-46 }, doi = { 10.5120/7843-1101 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Deepak Sharma %T Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization%T %J International Journal of Computer Applications %V 50 %N 14 %P 40-46 %R 10.5120/7843-1101 %I Foundation of Computer Science (FCS), NY, USA
This paper proposes a strategy based on processor utilization value provided by each sensor node of the network for detecting their malicious activities by comparing the node's present processor utilization value with the old estimated value . If the difference between the two values is higher or less than the expected value then that particular node become suspicious. A knowledge based system can take decision to expel the malicious node from the network topology