A Novel Approach of Node Clone Detection in Wireless Sensor Networks
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 10)Publication Date: 2014-10-05
Authors : G. David; K. Srujana;
Page : 529-534
Keywords : WSN; DTH; RDE;
Abstract
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. A few distributed solutions to address this fundamental problem have been recently proposed. Wireless sensor networks are vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations. Although the DHT-based protocol incurs similar communication cost as previous approaches, it may be considered a little high for some scenarios. To address this concern, our second distributed detection protocol, Our second distributed detection protocol named randomly directed exploration, presents good communication performance for dense sensor networks by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.
Other Latest Articles
- Knowledge of Building and Construction Materials among Polytechnic Students
- A New Bisecting K-means algorithm For Inferring User Search Goals Engine
- Association of Brain-Derived Neurotrophic Factor (BDNF) Variant (rs6265) with Overweight/Obesity orOverfatness, and Effect of Physical Activity Levels in Adolescents Population
- A Space Having the Homotopy Type with Fuzzy Modules
- Application of GA with SVM for Stock Price Prediction in Financial Market
Last modified: 2021-06-30 21:10:56