POWER AND RECOLLECTION CAPABLE DUPLICATE DETECTIONIN WSN

Vemuri Nagaraju, D.Raga Vamsi

Abstract


When using the clone recognition protocol, we are outfitted for maximizing the clone recognition probability. Our objective ought to be to propose a distributed clone recognition protocol with random witness selection so that you can enhance the clone recognition probability because the negative impact of network lifetime and the benefits of data buffer storage should be minimized. The ring structure facilitates energy-efficient data forwarding inside the path for the witnesses combined with the sink. We theoretically prove the recommended protocol is capable of doing one hundred percent clone recognition probability with trustful witnesses. Particularly, we exploit the location information of sensors randomly select witnesses located in a jewel ring place to guarantee the authenticity of sensors and also to report detected clone attacks. Furthermore, in a number of existing clone recognition protocols with random witness selection plan, the best buffer storage of sensors is usually using the node density. Extensive simulations show our recommended protocol is capable of doing extended network lifetime by effectively disbursing the traffic load within the network. The current system does not make sure that one or more inside the witnesses can consider the identity inside the sensor nodes to discover whether there is a clone attack otherwise. The performance inside the ERCD protocol is evaluated with regards to clone recognition probability, power consumption, network lifetime, and understanding buffer capacity. Extensive simulation results show our recommended ERCD protocol is capable of doing superior performance in line with the clone recognition probability and network lifetime with reasonable data buffer capacity.


Keywords


Wireless Sensor Networks; Clone Detection Protocol; Energy Efficiency; Network Lifetime

References


R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emergingmachine to machine communications,” IEEE Commun.Mag., vol. 49, no. 4, pp. 28–35, Apr. 2011.

R. Lu, X. Lin, X. Liang, and X. Shen, “A dynamic privacy-preserving key management scheme for location based services in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127–139, Jan. 2012.

Zhongming Zheng, Student Member, IEEE, Anfeng Liu, Member, IEEE, Lin X. Cai, Member, IEEE,Zhigang Chen, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE, “Energy and Memory Efficient Clone Detectionin Wireless Sensor Networks”, ieee transactions on mobile computing, vol. 15, no. 5, may 2016.

J. Li, J. Chen, and T. H. Lai, “Energy-efficient intrusion detectionwith a barrier of probabilistic sensors,” in Proc. IEEE INFOCOM,Orlando, FL, USA, Mar. 25-30, 2012, pp. 118–126.

M. Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficientprotocols for detecting node replication attacks in wireless sensornetworks,” in Proc. IEEE 17th Int. Conf. Netw. Protocols, Princeton,NJ, USA, Oct. 13-16, 2009, pp. 284–293.

C. Ok, S. Lee, P. Mitra, and S. Kumara, “Distributed routing in wireless sensor networks using energy welfare metric,” Inf. Sci., vol. 180, no. 9, pp. 1656–1670, May 2010.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.