Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
The wireless sensor networks are characterized by resourse constraint and large scalability. The wireless sensor networks are used in many critical application like military, health care services, industrial sectors etc. where highly secure transmission of data is required. An essential primitive in security which is a building block for any security service is pair wise key establishment. Wireless sensor networks are susceptible to the attack like node clone attacks, and there are several distributed protocols were proposed to detect this attack. However, the proposed protocols require much strong supposition to be practical for large-scale, randomly deployed sensor networks. In this paper, the system proposes two novel node clone detection protocols with great efficiency on network performance and condition. The first protocol is derived from a distributed hash table (DHT), by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The performance of protocol is improved with the help of probability model by efficient storage consumption and reducing the high security level theoretically. Then resulting equations with required adjustment for real time application are supported by simulations. Although the DHT-based protocol requires same communication cost as previous protocols, but for some scenario it may be considered as little high. To deal this, the randomly directed exploration protocol is emerged which provides better communication performance for large scale sensor network by probabilistic directed forwarding technique with random initial direction and border determination. The results of simulation preserve the protocol design and show satisfactory node clone detection probability and its efficiency on communication overhead. At the end we will compare this proposed system with those of existing methods for different criteria such as network scalability, storage overhead, network connectivity, network resiliency and average secure path length, and it is expected that this system will definitely improve the overall performance of the network as compared to existing ones.
Keywords: Wireless sensor networks, Key pre-distribution, Key management, Network scalability, security
Edition: Volume 3 Issue 11, November 2014
Pages: 2075 - 2077
How to Cite this Article?
Rekha V. Aher, Sunita Nandagave, "Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141348, Volume 3 Issue 11, November 2014, 2075 - 2077
136 PDF Views | 101 PDF Downloads
Similar Articles with Keyword 'Wireless sensor networks'
Views: 221 , Downloads: 148 | CTR: 67 %
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Views: 97 , Downloads: 67 | CTR: 69 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Views: 165 , Downloads: 91 | CTR: 55 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 125 , Downloads: 94 | CTR: 75 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3170 - 3173Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D
Views: 143 , Downloads: 99 | CTR: 69 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
Similar Articles with Keyword 'Key pre-distribution'
Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1658 - 1660A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks
Dinesh Dhakar, Ravi Khatri
Views: 126 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1270 - 1273A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks
Shishir Sharma, Gajendra Singh Chandel
Similar Articles with Keyword 'Key management'
Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Views: 139 , Downloads: 103 | CTR: 74 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3273 - 3277Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing
Farhat Afshan, Shameem Akther
Views: 125 , Downloads: 104 | CTR: 83 %
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 781 - 785Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao
Similar Articles with Keyword 'Network scalability'
Views: 136 , Downloads: 101 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Views: 161 , Downloads: 121 | CTR: 75 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 2115 - 2118Survey on Efficient Clustering with Energy Aware Routing in Wireless Sensor Networks
Anita Chavan, Simran Khiani
Views: 154 , Downloads: 121 | CTR: 79 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1160 - 1163Effective Energy Path Based PDORP Routing Protocol for WSN
Swapnali Latake, Sachin V. Todkari
Similar Articles with Keyword 'security'
Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 47 , Downloads: 40 | CTR: 85 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Views: 163 , Downloads: 40 | CTR: 25 %
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S