A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage

Abstract

We propose an energy-efficient location-aware clone location convention in thickly conveyed WSNs, which can ensure successful clone attack recognition and keep up attractive system lifetime. In particular, we misuse the area data of sensors and haphazardly select witnesses situated in a ring zone to check the authenticity of sensors and to report identified clone attacks. The ring structure encourages vitality productive information sending along the way towards the witnesses and the sink. We hypothetically demonstrate that the proposed convention can accomplish 100 percent clone identification likelihood with trustful witnesses. We additionally broaden the work by concentrate the clone identification execution with untrustful witnesses and demonstrate that the clone recognition likelihood still methodologies 98 percent when 10 percent of witnesses are traded off.

Authors and Affiliations

S. Mani Karthik| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, P. Rama Krishna| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi

Keywords

Related Articles

Integrated Attestation Scheme for Scalable Distributed Services in Software-as-a-Service Clouds

Ensuring Security, Data Integrity and Seamless Availability for information very still, in movement, and being used, for Outsourcing delicate and vital information in the hands of a cloud supplier is essential assign...

Fuzzy logic controller based DC-Link Voltage Self-Balance Method for Multilevel Converter with less Number of Voltage Sensors

In many inverters, Voltage balance of dclink capacitors is very important for applications of a cascade multilevel converter or a modular multilevel converter. In this paper, a novel diode-clamped modular multilevel c...

Improve the Security and Usability of User Session using Continuous Authentication Protocol

Session organization of distributed web applications is usually depends on textual passwords and biometric verification at the starting of session, but here single authentication is happening. In this the problem is c...

A New MMC Converter With Fault Blocking Capability for HVDC Interconnects

This work proposes a modular multilevel dc/dc converter, named the DC-MMC, that can be conveyed to interconnect HVDC systems of various or comparable voltage levels. Its key elements include: 1) bidirectional power s...

Early detection of Knee Osteoarthritis using SVM Classifier

Osteoarthritis of Knee (KOA) is the most commonly found arthritis types. It is distinguished by wearing away of cartilage which is meant to ensure smooth movement between bones in joints. As a result of the wearing a...

Download PDF file
  • EP ID EP16918
  • DOI -
  • Views 308
  • Downloads 6

How To Cite

S. Mani Karthik, P. Rama Krishna (2017). A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage. International Journal of Science Engineering and Advance Technology, 5(5), 415-418. https://europub.co.uk/articles/-A-16918