Providing High Security for WSN’s Using Distributed Hash Table (DHT)

Abstract

There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes efficiently. The protocol presentation on competent storage consumption and elevated security level is theoretically deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability.

Authors and Affiliations

V Sarah Grace, Ramu Vikruthi

Keywords

Related Articles

Multivariate Link Analysis Approach Against DOS Attacks

Over the net, in our regular life we keep an eye on zone unit working with interconnect frameworks like web servers, data servers, and distributed computing servers. These region unit the frameworks that region unit...

BLIND SOURCE SEPARATION OF PARTIAL AND FULL TRANSPARENCY IMAGE USING IMAGE SEPARATION ALGORITHM

The problem of blind separation of multiple source layers from their linear mixtures with unknown mixing coefficients and unknown layer motions. Such mixtures or Full Transparency or Superimposed image can occur when...

A Novel Approach for Multiple Resource Allocation In WWW

With the rapid growth of the Web, clients attempting to access some popular Web sites are experiencing slow response times due to server load and network congestion. In the paper we are proposing a method for trusted...

A Reliable Routing Approach in Mobile AdHoc Network based on Genetic Algorithms

The Mobile Network is highly constraint requirement to improve the quality of service in secure way, it uses different changes in MANET protocols, its parameters, routing algorithm etc. Nature inspired and the challeng...

Wi-Fi Based Smart Energy Meter

Home automation is fast popularity nowadays. An automatic remote meter-reading system based on Wi-Fi is presented in this paper can be considered as a part of home automation. The Energy data collection system is a ve...

Download PDF file
  • EP ID EP28041
  • DOI -
  • Views 247
  • Downloads 0

How To Cite

V Sarah Grace, Ramu Vikruthi (2014). Providing High Security for WSN’s Using Distributed Hash Table (DHT). International Journal of Research in Computer and Communication Technology, 3(10), -. https://europub.co.uk/articles/-A-28041