International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 50 - Number 14 |
Year of Publication: 2012 |
Authors: Deepak Sharma |
10.5120/7843-1101 |
Deepak Sharma . Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization. International Journal of Computer Applications. 50, 14 ( July 2012), 40-46. DOI=10.5120/7843-1101
This paper proposes a strategy based on processor utilization value provided by each sensor node of the network for detecting their malicious activities by comparing the node's present processor utilization value with the old estimated value . If the difference between the two values is higher or less than the expected value then that particular node become suspicious. A knowledge based system can take decision to expel the malicious node from the network topology