Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Rekha V. Aher; Sunita Nandagave;
Page : 2075-2077
Keywords : Wireless sensor networks; Key pre-distribution; Key management; Network scalability; security;
Abstract
The wireless sensor networks are characterized by resourse constraint and large scalability. The wireless sensor networks are used in many critical application like military, health care services, industrial sectors etc. where highly secure transmission of data is required. An essential primitive in security which is a building block for any security service is pair wise key establishment. Wireless sensor networks are susceptible to the attack like node clone attacks, and there are several distributed protocols were proposed to detect this attack. However, the proposed protocols require much strong supposition to be practical for large-scale, randomly deployed sensor networks. In this paper, the system proposes two novel node clone detection protocols with great efficiency on network performance and condition. The first protocol is derived from a distributed hash table (DHT), by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The performance of protocol is improved with the help of probability model by efficient storage consumption and reducing the high security level theoretically. Then resulting equations with required adjustment for real time application are supported by simulations. Although the DHT-based protocol requires same communication cost as previous protocols, but for some scenario it may be considered as little high. To deal this, the randomly directed exploration protocol is emerged which provides better communication performance for large scale sensor network by probabilistic directed forwarding technique with random initial direction and border determination. The results of simulation preserve the protocol design and show satisfactory node clone detection probability and its efficiency on communication overhead. At the end we will compare this proposed system with those of existing methods for different criteria such as network scalability, storage overhead, network connectivity, network resiliency and average secure path length, and it is expected that this system will definitely improve the overall performance of the network as compared to existing ones.
Other Latest Articles
- Survey on DDoS Attack in Cloud Network
- A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment
- XOR- Based Secrete Sharing Scheme For Image Database Security: A Review
- Comparison of Facts Devices to Relieve Congestion in Deregulated Power Sector by Using Fuzzy Technique
- Isolation of Solanine from Potato Leaves and Evaluation of Its Antimicrobial Activity
Last modified: 2021-06-30 21:12:54