Distributed Hash Table (DHT) Based Clone Detection In WSN’s

Abstract

Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and eminent security level is tentatively deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability. Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone.

Authors and Affiliations

P. V. Siva Durga, U. Vinod Kumar

Keywords

Related Articles

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)

Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized....

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks

Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed...

E-IHRB Decoder Architectures for Non-Binary LDPC Codes

In the information theory, the non- binary low density parity check (NB-LDPC) code is a linear error correcting code, a method of transmitting message over a noisy transmission channel. LDPCcodes are capacityapproachi...

Integrity verification using PDP in multi cloud storage

Now a days cloud computing has been used by many organizations, because of its benefits like total cost reduction and accessibility of data. Multi cloud storage is recently being popular through it’s several advantag...

Download PDF file
  • EP ID EP28093
  • DOI -
  • Views 268
  • Downloads 0

How To Cite

P. V. Siva Durga, U. Vinod Kumar (2014). Distributed Hash Table (DHT) Based Clone Detection In WSN’s. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28093