A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 5
Abstract
We propose an energy-efficient location-aware clone location convention in thickly conveyed WSNs, which can ensure successful clone attack recognition and keep up attractive system lifetime. In particular, we misuse the area data of sensors and haphazardly select witnesses situated in a ring zone to check the authenticity of sensors and to report identified clone attacks. The ring structure encourages vitality productive information sending along the way towards the witnesses and the sink. We hypothetically demonstrate that the proposed convention can accomplish 100 percent clone identification likelihood with trustful witnesses. We additionally broaden the work by concentrate the clone identification execution with untrustful witnesses and demonstrate that the clone recognition likelihood still methodologies 98 percent when 10 percent of witnesses are traded off.
Authors and Affiliations
S. Mani Karthik| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, P. Rama Krishna| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi
The Competent Service Management and Reliable Trustworthiness in Cloud Environment
Presently days, Cloud Computing is having trust area in innovative work regardless of loads of work in the stream. There are number of research issues in this section including trust management, privacy, security, re...
Blending Cloud Mode With Well-Balanced Recognised Redundancy Elimination Technique
Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...
Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential a...
Fuzzy logic controller based DC-Link Voltage Self-Balance Method for Multilevel Converter with less Number of Voltage Sensors
In many inverters, Voltage balance of dclink capacitors is very important for applications of a cascade multilevel converter or a modular multilevel converter. In this paper, a novel diode-clamped modular multilevel c...
IDDR Scheme for a Potential Based Multi Path Dynamic Routing Algorithm
Applications running on the same (WSN) stage more often than not have diverse Quality of Service (QoS) prerequisites. Two fundamental prerequisites are low deferral and high information integrity. In any case, by and...