Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and eminent security level is tentatively deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability. Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone.
Authors and Affiliations
P. V. Siva Durga, U. Vinod Kumar
A Efficient QOS based User selection in Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. Wireless reprogramming in a wireless sensor network (WSN) is the process of propag...
Pulse Triggered Flip-Flop Design With Conditional Pulse Enhancement
In this paper a new technique is proposed based on the comparison between Conventional Transistorized Flip-flop and Data transition Look ahead D flip flop here we are checking the working of CDMFF and the conventiona...
Improving GDOP inPseudolite only Navigation System using Genetic Algorithm
Position fix accuracy of Pseudolite only navigation system [1] mainly depends upon minimum achievable GDOP (Geometrical Dilution of precision) by suitable placement of Transmitters. The suitable placement of transmi...
Outsourced Similarity Search on Metric Data Assets
Similarity querying of metric data which is stored in cloud is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server fo...
Wireless Mesh Network Deployed in Disaster Area using Gateway Selection
As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to p...