Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and eminent security level is tentatively deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability. Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone.
Authors and Affiliations
P. V. Siva Durga, U. Vinod Kumar
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)
Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized....
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks
Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed...
E-IHRB Decoder Architectures for Non-Binary LDPC Codes
In the information theory, the non- binary low density parity check (NB-LDPC) code is a linear error correcting code, a method of transmitting message over a noisy transmission channel. LDPCcodes are capacityapproachi...
Integrity verification using PDP in multi cloud storage
Now a days cloud computing has been used by many organizations, because of its benefits like total cost reduction and accessibility of data. Multi cloud storage is recently being popular through it’s several advantag...