Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical for large-scale, randomly deployed sensor networks. In the proposed system, using distributed clone detection protocol namely ercd (energy-efficient ring based clone detection) protocol which has two stages: witness selection and legitimacy verification for clone detection. In the modification process, the first one is based on a distributed hash table (dht) in which the chord algorithm which is used to detect the cloned node, every node is assigned with the random key, before it transmits the data it has to give its key which would be verified by the witness node. If the same key is been given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor-list containing all neighbor ids and its locations. We are implementing chord algorithm, by location based nodes identification, where every region/location will have a group leader. The group leader will generate a random number with the time stamp to the available nodes that are in that location. Witness nodes verify the random number and time stamp to detect the cloned node. The message is also encrypted for security purpose.
Authors and Affiliations
B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha
Effect of Treated and Untreated Textile Effluent on the Strength, Plasticity and pH characteristics of Kaolinite Clay
Both solid and liquid wastes are increasingly getting mixed up with soils leading to a change in soil environment. These in turn changes the geotechnical properties of soil. Among the liquid and solid wastes, liquid was...
Self Destruction of Data using Active Storage
Nowadays internet is the strongest way to connect the people. Internet encompasses banking, messaging, sharing data social networking etc. By developing cloud technology maximum applications are using cloud interface, a...
Nano materials filled Polymers for reducing the thermal Peak temperature in a vehicle
There is an increasing demand for fuel nowadays and it is soon expected that there will be an acute shortage in the fuel that we are using at present. Hence there is a need to optimize the fuel usage. Almost 10% of f...
SRWD Technique for Security Enhancement of Audio Steganography
From the past few years with progression in era of information society and their related applications are becoming more and more popular. Attacks can occur due to system vulnerabilities or user misuse or program defects...
Design of FPGA Controlled Closed Loop BiDirectional DC-DC (BDC) Converter for Renewable Energy Storage Applications
This paper describes the development of Bi-Directional DC-DC converter (BDC) for solar application. BDC can be used either as a Buck converter or either as a Boost converter. Designed converter in this paper is controll...