A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage

Abstract

We propose an energy-efficient location-aware clone location convention in thickly conveyed WSNs, which can ensure successful clone attack recognition and keep up attractive system lifetime. In particular, we misuse the area data of sensors and haphazardly select witnesses situated in a ring zone to check the authenticity of sensors and to report identified clone attacks. The ring structure encourages vitality productive information sending along the way towards the witnesses and the sink. We hypothetically demonstrate that the proposed convention can accomplish 100 percent clone identification likelihood with trustful witnesses. We additionally broaden the work by concentrate the clone identification execution with untrustful witnesses and demonstrate that the clone recognition likelihood still methodologies 98 percent when 10 percent of witnesses are traded off.

Authors and Affiliations

S. Mani Karthik| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, P. Rama Krishna| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi

Keywords

Related Articles

The Competent Service Management and Reliable Trustworthiness in Cloud Environment

Presently days, Cloud Computing is having trust area in innovative work regardless of loads of work in the stream. There are number of research issues in this section including trust management, privacy, security, re...

Blending Cloud Mode With Well-Balanced Recognised Redundancy Elimination Technique

Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...

Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique

Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential a...

Fuzzy logic controller based DC-Link Voltage Self-Balance Method for Multilevel Converter with less Number of Voltage Sensors

In many inverters, Voltage balance of dclink capacitors is very important for applications of a cascade multilevel converter or a modular multilevel converter. In this paper, a novel diode-clamped modular multilevel c...

IDDR Scheme for a Potential Based Multi Path Dynamic Routing Algorithm

Applications running on the same (WSN) stage more often than not have diverse Quality of Service (QoS) prerequisites. Two fundamental prerequisites are low deferral and high information integrity. In any case, by and...

Download PDF file
  • EP ID EP16918
  • DOI -
  • Views 303
  • Downloads 6

How To Cite

S. Mani Karthik, P. Rama Krishna (2017). A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage. International Journal of Science Engineering and Advance Technology, 5(5), 415-418. https://europub.co.uk/articles/-A-16918