Detection of Node Clones in Wireless Sensor Network Using Detection Protocols
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 8, Issue 6
Abstract
Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability.
Authors and Affiliations
Neenu George , T. K. Parani
Preventing VANET From DOS & DDOS Attack
VANET is an emerging technology; it is a special class of MANET. There are many challenges that must be addressed before it can be successfully deployed. In recent years, not much work is done in the field of security. F...
Performance Analysis of Various Vedic Techniques for Multiplication
Multiplication is an important factor in arithmetic operations and is carried out in a number of Digital Signal Processing applications. As Multipliers take a long time for execution so there is a need of fast mult...
Power Factor Improvement of Induction Motor by Using Capacitors
This paper describes the improvement of power factor of an induction motor by using capacitor bank. When power factor is improved, automatically energy will be saved A power factor is the goal of any electrical uti...
A Survey on Improving the Clustering Performance in Text Mining for Efficient Information Retrieval
In recent years, the development of information systems in every field such as business, academics and medicine has led to increase in the amount of stored data year by year. A vast majority of data are stored in documen...
Assessment of Basaltic Aggregate and Stone Chips In Indian Context
The producing useful shape of stone the various stone wastes are coming out from the various processes in stone industries. From the preliminary waste named as stone chips, due to minimum cost it is taken out t...