Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical for large-scale, randomly deployed sensor networks. In the proposed system, using distributed clone detection protocol namely ercd (energy-efficient ring based clone detection) protocol which has two stages: witness selection and legitimacy verification for clone detection. In the modification process, the first one is based on a distributed hash table (dht) in which the chord algorithm which is used to detect the cloned node, every node is assigned with the random key, before it transmits the data it has to give its key which would be verified by the witness node. If the same key is been given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor-list containing all neighbor ids and its locations. We are implementing chord algorithm, by location based nodes identification, where every region/location will have a group leader. The group leader will generate a random number with the time stamp to the available nodes that are in that location. Witness nodes verify the random number and time stamp to detect the cloned node. The message is also encrypted for security purpose.
Authors and Affiliations
B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha
Finite Element Analysis of Bond Behaviour Between Concrete and Steel Reinforcing Bar by Pull Out
Bond strength is very important in reinforced concrete and it is necessary to create suitable bond between steel and surrounding concrete. Bond strength is the means by which load is transferred between steel and concre...
Approaches for Software Testing Using UML
this testing process is based on using the modeling techniques that are defined in Unified modeling language. Software Testing is a important role for software development .The software development are two important pha...
slugReview Paper on Clustering and Validation Techniques
Clustering is important in data analysis and data mining applications. It is the task of grouping a set of objects so that objects in the same group are more similar to each other than to those in other groups (clust...
An Oblivious and Robust Image Watermarking Algorithm Using SVD Transformation
Digital multimedia content protection has increasingly become an important issue. As image watermarking is identified as a major technology used in Copyright and Content Protection, a key necessity for image watermarkin...
Radar Imaging In Two Dimensions
This paper is going to describe what is radar imaging in two dimensions, principles on which it works, it’s application, what are the types of radar imaging ,what are the major problems occurring in it and the solutions...