ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 2075-2077

Keywords : Wireless sensor networks; Key pre-distribution; Key management; Network scalability; security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless sensor networks are characterized by resourse constraint and large scalability. The wireless sensor networks are used in many critical application like military, health care services, industrial sectors etc. where highly secure transmission of data is required. An essential primitive in security which is a building block for any security service is pair wise key establishment. Wireless sensor networks are susceptible to the attack like node clone attacks, and there are several distributed protocols were proposed to detect this attack. However, the proposed protocols require much strong supposition to be practical for large-scale, randomly deployed sensor networks. In this paper, the system proposes two novel node clone detection protocols with great efficiency on network performance and condition. The first protocol is derived from a distributed hash table (DHT), by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The performance of protocol is improved with the help of probability model by efficient storage consumption and reducing the high security level theoretically. Then resulting equations with required adjustment for real time application are supported by simulations. Although the DHT-based protocol requires same communication cost as previous protocols, but for some scenario it may be considered as little high. To deal this, the randomly directed exploration protocol is emerged which provides better communication performance for large scale sensor network by probabilistic directed forwarding technique with random initial direction and border determination. The results of simulation preserve the protocol design and show satisfactory node clone detection probability and its efficiency on communication overhead. At the end we will compare this proposed system with those of existing methods for different criteria such as network scalability, storage overhead, network connectivity, network resiliency and average secure path length, and it is expected that this system will definitely improve the overall performance of the network as compared to existing ones.

Last modified: 2021-06-30 21:12:54