Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical for large-scale, randomly deployed sensor networks. In the proposed system, using distributed clone detection protocol namely ercd (energy-efficient ring based clone detection) protocol which has two stages: witness selection and legitimacy verification for clone detection. In the modification process, the first one is based on a distributed hash table (dht) in which the chord algorithm which is used to detect the cloned node, every node is assigned with the random key, before it transmits the data it has to give its key which would be verified by the witness node. If the same key is been given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor-list containing all neighbor ids and its locations. We are implementing chord algorithm, by location based nodes identification, where every region/location will have a group leader. The group leader will generate a random number with the time stamp to the available nodes that are in that location. Witness nodes verify the random number and time stamp to detect the cloned node. The message is also encrypted for security purpose.
Authors and Affiliations
B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha
Improved Methodology for Storage and Quick Retrieval of Hard Files using 5s Principles
Certain departments of large organizations have to maintain heavy amount of data in printed form. This includes project wise files, meeting reports, important project related documents etc. for each year since the incep...
Histophysiology of Byssus Gland of Captive Mytilus viridis Revealed through Histochemistry
Histochemical and Electron microscopic studies were carried out on byssus gland of Mytilus viridis (found along the coast of Gujarat) to get an idea of histophysiology of the gland of the animal during the conditions of...
slugAnalysis of Artificial Neural Networks Based Intrusion Detection Systems for Mobile Ad Hoc Networks
In mobile ad hoc networks, Intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the se...
Feedback and Emotion Polarity Extraction from Online Reviewer Sites
This research proposed collection of words and dictionary lookup based reviewer content emotion positive-negative polarity estimation technique from text. The restaurant review comments, feedback, notes, discussion and...
Multiple Logic Styles for Low Power VLSI
In this review paper, full adder was designed using CMOS logic, pass transistor logic (PTL), transmission gate logic (TG) styles. We are going to compare adiabatic full adder using ECRL & PFAL logics with conventional d...