FORCE AND RECOLLECTION PROFICIENT REPLICA FINDING IN WSNS

G. Sreeman, R.Praveen Kumar

Abstract


Using the duplicate acknowledgment contract, we like overemphasize the repeat approval possibility. Our target eager to aim a scattered reproduce esteem contract with aimless see choice forthcoming able to develop the duplicate esteem possibility as the adverse kick of net career and the advantages of data bumper storehouse ought forthcoming minimized. The ring formation facilitates energy-efficient data forwarding transversely the path for the seas and also the sink. We on paper test the recommended pact take care of 100 % repeat esteem feasibility with upbeat notes. Particularly, we utilize the plant science of sensors and at aimless make announces positioned in a corundum ring plant to double-check the purity of sensors and also to disclose detected reproduce beats. Furthermore, in many extant reproduce acknowledgment obligations with odd notice draft plan, the required bumper cache of sensors is publicly contingent the node thickness. Extensive reproductions show our counseled contract take care of interminable structure existence by productively disbursing the industry load over the chain. The ready process doesn't care for that a margin of one from the announces can study the unity from the sensor nodes to uncover even if there's a reproduce besiege or on the other hand. The show from the ERCD pact is evaluated when it comes to replicate credit feasibility, strength depletion, chain period, and education cushion strength. Extensive duplication results show our advised ERCD contract may superhuman show with remembrances to the repeat credit feasibility and net period with judicious data bumper capability.


Keywords


Wireless Sensor Networks; Clone Detection Protocol; Energy Efficiency; Network Lifetime;

References


Zhongming Zheng, Student Member, IEEE, Anfeng Liu, Member, IEEE, Lin X. Cai, Member, IEEE,Zhigang Chen, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE, “Energy and Memory Efficient Clone Detectionin Wireless Sensor Networks”, ieee transactions on mobile computing, vol. 15, no. 5, may 2016.

J. Li, J. Chen, and T. H. Lai, “Energy-efficient intrusion detection with a barrier of probabilistic sensors,” in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 25-30, 2012, pp. 118–126.

M. Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE 17th Int. Conf. Netw. Protocols, Princeton, NJ, USA, Oct. 13-16, 2009, pp. 284–293.

R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emergingmachine to machine communications,” IEEE Commun.Mag., vol. 49, no. 4, pp. 28–35, Apr. 2011.

R. Lu, X. Lin, X. Liang, and X. Shen, “A dynamic privacy-preserving key management scheme for location based services in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127–139, Jan. 2012.

C. Ok, S. Lee, P. Mitra, and S. Kumara, “Distributed routing in wireless sensor networks using energy welfare metric,” Inf. Sci., vol. 180, no. 9, pp. 1656–1670, May 2010.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.