Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN

Abstract

In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical for large-scale, randomly deployed sensor networks. In the proposed system, using distributed clone detection protocol namely ercd (energy-efficient ring based clone detection) protocol which has two stages: witness selection and legitimacy verification for clone detection. In the modification process, the first one is based on a distributed hash table (dht) in which the chord algorithm which is used to detect the cloned node, every node is assigned with the random key, before it transmits the data it has to give its key which would be verified by the witness node. If the same key is been given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor-list containing all neighbor ids and its locations. We are implementing chord algorithm, by location based nodes identification, where every region/location will have a group leader. The group leader will generate a random number with the time stamp to the available nodes that are in that location. Witness nodes verify the random number and time stamp to detect the cloned node. The message is also encrypted for security purpose.

Authors and Affiliations

B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha

Keywords

Related Articles

XYZ Analysis for Inventory Management – Case Study of Steel Plant

An inventory management is technique which is generally used to manage the organization effectively. The organization wants to control their inventory cost, material cost, labor cost etc. There are several inventory tec...

Optimization of air brake system using rotary compressor in Locomotives

Air brake system comprises the brake system using compressed air. For getting the pressurized air we use the compressor. Air brake system is used to stop the running train locomotive which contain high amount of kinetic...

Unsteady MHD Free Convective Chemically Absorption Fluid Past an Impulsively Accelerated Plate with Thermal Radiation

A theoretical study on free convective heat and mass transfer flow of an electrically conducting incompressible viscous fluid past an impulsively accelerated permeable plate embedded in Darcian (thermal) absorption medi...

PSO Algorithm based Loss Minimization Approach for Optimal Placement and Sizing of Renewable Energy Source

In this research paper, PSO is joint with Newton Raphson method of power flow to optimize optimal location along with size of renewable energy source. A NR method is used to measure the losses and find the voltage at ea...

slugDevelopment and Proximate Properties of Acceptable Taro-Soybean Flour

A sample of trained panelists was used to evaluate a food product formulation called “Taro-Soy”, a taro based soy bean edible composite flour. The proximate properties of the most acceptable formulation were determined....

Download PDF file
  • EP ID EP23239
  • DOI http://doi.org/10.22214/ijraset.2017.3042
  • Views 268
  • Downloads 9

How To Cite

B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha (2017). Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23239