Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

The wireless sensor networks are characterized by resourse constraint and large scalability. The wireless sensor networks are used in many critical application like military, health care services, industrial sectors etc. where highly secure transmission of data is required. An essential primitive in security which is a building block for any security service is pair wise key establishment. Wireless sensor networks are susceptible to the attack like node clone attacks, and there are several distributed protocols were proposed to detect this attack. However, the proposed protocols require much strong supposition to be practical for large-scale, randomly deployed sensor networks. In this paper, the system proposes two novel node clone detection protocols with great efficiency on network performance and condition. The first protocol is derived from a distributed hash table (DHT), by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The performance of protocol is improved with the help of probability model by efficient storage consumption and reducing the high security level theoretically. Then resulting equations with required adjustment for real time application are supported by simulations. Although the DHT-based protocol requires same communication cost as previous protocols, but for some scenario it may be considered as little high. To deal this, the randomly directed exploration protocol is emerged which provides better communication performance for large scale sensor network by probabilistic directed forwarding technique with random initial direction and border determination. The results of simulation preserve the protocol design and show satisfactory node clone detection probability and its efficiency on communication overhead. At the end we will compare this proposed system with those of existing methods for different criteria such as network scalability, storage overhead, network connectivity, network resiliency and average secure path length, and it is expected that this system will definitely improve the overall performance of the network as compared to existing ones.

Keywords: Wireless sensor networks, Key pre-distribution, Key management, Network scalability, security

Edition: Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Share this Article

How to Cite this Article?

Rekha V. Aher, Sunita Nandagave, "Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141348, Volume 3 Issue 11, November 2014, 2075 - 2077

136 PDF Views | 101 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Wireless sensor networks'

Views: 221 , Downloads: 148 | CTR: 67 %

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 97 , Downloads: 67 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 125 , Downloads: 94 | CTR: 75 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3170 - 3173

Wireless Sensor Networks for Traffic Congestion Monitoring

Nitish R Chavan, Ravinarayana.B, Ravikumar.D

Share this Article

Views: 143 , Downloads: 99 | CTR: 69 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Similar Articles with Keyword 'Key pre-distribution'

Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Views: 126 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Similar Articles with Keyword 'Key management'

Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Views: 139 , Downloads: 103 | CTR: 74 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Views: 125 , Downloads: 104 | CTR: 83 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Similar Articles with Keyword 'Network scalability'

Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Views: 161 , Downloads: 121 | CTR: 75 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2115 - 2118

Survey on Efficient Clustering with Energy Aware Routing in Wireless Sensor Networks

Anita Chavan, Simran Khiani

Share this Article

Views: 154 , Downloads: 121 | CTR: 79 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1160 - 1163

Effective Energy Path Based PDORP Routing Protocol for WSN

Swapnali Latake, Sachin V. Todkari

Share this Article

Similar Articles with Keyword 'security'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 163 , Downloads: 40 | CTR: 25 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article
Top