A STUDY OF CLONE DETECTING TECHNIQUES IN STATIONARY AND MOBILE WIRELESS SENSOR NETWORK
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 1
Abstract
Mobile Wireless sensor network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other without a need for fixed infrastructure. Sensor nodes are not equipped with tamper resistant hardware which arises many security challenges. Some of threats are clone attack, Wormhole attack, Sybil attack etc. The attack concentrated in this paper is Clone attack. Here, adversary subverts the network by just introducing replicas of previously compromised nodes. We have some traditional approaches to detect cloned nodes in stationary sensor nodes. The mobility of sensor nodes increases the challenges faced while detecting clone attacks. Recent research work leads to design of many protocols to detect clone in MWSN with low storage overhead, low computation overhead and increased probability of detection. This paper studies various techniques for detection of clones in mobile and stationary environment. It also summarizes various parameters to evaluate the detection probability of techniques discussed.
Authors and Affiliations
R. Priyadharshni , R. Selva Bharathi , Mr. S. Ramesh
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosy...
A New Technique to Backup and Restore DBMS using XML and .NET Technologies
In this paper, we proposed a new technique for backing up and restoring different Database Management Systems (DBMS). he technique is enabling to backup and restore a part of or the whole database using a unified interf...
IMPROVED ROUND ROBIN POLICY A MATHEMATICAL APPROACH
This work attempts to mathematically formulize the computation of waiting time of any process in a static -process, CPU-bound round robin scheme. That in effect, can calculate other performance measures also. An improv...
A Novel Approach to Clustering of Proteins
Data Analysis plays an indispensable role for understanding various phenomena. Clustering algorithms are a class of important tools for data analysis. K-means cluster analysis is considered to cluster protein variates ac...
Step Counting Using Smartphone-Based Accelerometer
This paper presents a method for counting the number of steps taken by a user, while walking at any variable speed, using smartphone-based accelerometer. For this purpose, the steps are detected based on a relation betwe...