Downloads: 112 | Views: 257
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.8 / 10
Enhanced Distributed Detection Protocol for Node Replication Attack
Aiswaria E S
Abstract: Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, two new node clone detection protocols with different tradeoffs on network conditions and performance are proposed. The first one is based on a DHT concept which abbreviated as distributed hash table, by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary modification for real application, are supported by the simulations. But the DHT-based protocol incurs similar communication cost as previous techniques, it may be considered a little high for some scenarios. To overcome communication cost problem our second approach RDE/DDE distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.
Keywords: wireless sensor networks wsn, distributed hash table, randomly directed exploration
Edition: Volume 4 Issue 6, June 2015
Pages: 1499 - 1503
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 103
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1124 - 1127A Multiple QOS Constraints Based Trustworthy Resource Sharing In Cloud Computing Using Fuzzy Neural Network Harmony Platform
Gils P Jose, D Satish Kumar
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 838 - 842Reliable Transmission with Fault Node Recovery Algorithm in Wireless Sensor Network
Ayesha Mulla, Komal Mohite, Madhuri Mane
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2320 - 2322Survey on Data Collection Methods for Wireless Sensor Network
Soumya Dath G