अमूर्त

Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks

P.Hima Bindu, T. Venkata Naga Jayudu

Wireless sensor networks are resource constrained and vulnerable to various kinds of attacks. In this paper we study node clone attack. Many solutions came into existence and for detecting this attack. Many solutions need assumptions to have the problem solved in large-scale deployment of sensors. They have tradeoffs between the solutions provided and network conditions. Recently Li and Gong proposed two protocols for node clone detection with different tradeoffs with network conditions. Distributed Hash Table (DHT) was used to have distributed mechanisms for node clone detection. Due to the overhead caused by DHT, they proposed another protocol that overcomes this problem. In this paper, we implement a novel mechanism that can detect node clone attack in wireless sensor networks. We made simulations in NS2 to demonstrate the proof of concept.

में अनुक्रमित

Index Copernicus
Academic Keys
CiteFactor
Cosmos IF
RefSeek
Hamdard University
World Catalogue of Scientific Journals
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

और देखें