POWER AND MEMORY EFFICIENCY RESEMBLES DISCOVERY IN WSN

Golla Vasantha Lakshmi, P Venu Babu

Abstract


Using the copy perception politesse, we're designed for bloat the repeat awareness likeliness. Our object will be to nominate a diffuse double admission formality beside objectless watch election if you want to extend the repeat apperception promise because the gloomy influence of meet time and the benefits of knowledge cushion arcade must be minimized. The buzz fabric facilitates energy-efficient statistics forwarding around the procedure for the bystanders and likewise the slip. We in a sense end up the offered propriety cut the mustard 100 % copy apperception anticipation amidst wide-eyed spectators. Particularly, we take advantage of the office leak of sensors and at unaided pick out certifies planted within a jewel clap stick to make sure the legitimacy of sensors and likewise to broadcast detected copy charges. Furthermore, in lots of current look-alike computer admission orders upon design less watch picking arrange, the essential intermediary larder of sensors is usually subject to the nodule tightness. Extensive likeness displays our offered p's and q's cut the mustard windy reticule life by dramatically disbursing the bargain shipment extra the circulate. The do rule does not be sure that at least one with the eyeballs can inspect the name on the sensor bumps in finding out in case there is a copy infiltrate or another way. The conduct with the ERCD concordat is evaluated in terms of duplicate approval odds, right diminution, meet all one's born days, and information bumper skill. Extensive duplicate results establish our advised ERCD agreement may admirable operation near regards to the look-alike computer strokes credibility and schmooze endurance near feasible results defense intelligence.


Keywords


Wireless Sensor Networks; Clone Detection Protocol; Energy Efficiency; Network Lifetime;

References


M. Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE 17th Int. Conf. Netw. Protocols, Princeton, NJ, USA, Oct. 13-16, 2009, pp. 284–293.

R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emergingmachine to machine communications,” IEEE Commun.Mag., vol. 49, no. 4, pp. 28–35, Apr. 2011.

R. Lu, X. Lin, X. Liang, and X. Shen, “A dynamic privacy-preserving key management scheme for location based services in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127–139, Jan. 2012.

C. Ok, S. Lee, P. Mitra, and S. Kumara, “Distributed routing in wireless sensor networks using energy welfare metric,” Inf. Sci., vol. 180, no. 9, pp. 1656–1670, May 2010.

Zhongming Zheng, Student Member, IEEE, Anfeng Liu, Member, IEEE, Lin X. Cai, Member, IEEE,Zhigang Chen, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE, “Energy and Memory Efficient Clone Detectionin Wireless Sensor Networks”, ieee transactions on mobile computing, vol. 15, no. 5, may 2016.

J. Li, J. Chen, and T. H. Lai, “Energy-efficient intrusion detection with a barrier of probabilistic sensors,” in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 25-30, 2012, pp. 118–126.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.