Providing High Security for WSN’s Using Distributed Hash Table (DHT)

Abstract

There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes efficiently. The protocol presentation on competent storage consumption and elevated security level is theoretically deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability.

Authors and Affiliations

V Sarah Grace, Ramu Vikruthi

Keywords

Related Articles

NEURAL NETWORK & GENETIC ALGORITHM BASED FACE RECOGNITION SYSTEM

Facial image analysis plays a significant role for human computer interaction. Automatic analysis of human face is still a challenging and emerging problem with many applications. In this paper, we proposed a neural...

Improvement of PAPR and BER in OFDM Using Combination of SLM and Clipping Techniques

Orthogonal Frequency Division Multiplexing (OFDM) is high speed data transmission scheme. It has got various advantages like easy and efficient in dealing with multi-path, robust against narrow-band interference, sup...

A Scheme for Authentication with Multiple Levels of Anonymity in Vehicular Communication

Vehicular ad hoc networks (VANETs) have become the area of keen interest for many researchers over the last few years. As vanet have potential technology to enhance active and preventive safety on the road, as well a...

A Novel Technique for Cost Reduction among Sender And Receiver In Cloud

We present PACK (Predictive ACKs), a novel endto-end activity repetition disposal (TRE) framework, intended for cloud computing clients. Cloud-based TRE needs to apply a sensible utilization of cloud assets so that th...

Emotion Recognition from Human Eye Expression

Facial expressions play an essential role in communications in social interactions with other human beings which deliver rich information about their emotions. The most crucial feature of human interaction that gran...

Download PDF file
  • EP ID EP28041
  • DOI -
  • Views 240
  • Downloads 0

How To Cite

V Sarah Grace, Ramu Vikruthi (2014). Providing High Security for WSN’s Using Distributed Hash Table (DHT). International Journal of Research in Computer and Communication Technology, 3(10), -. https://europub.co.uk/articles/-A-28041