Enhanced Distributed Detection Protocol for Node Replication Attack
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, two new node clone detection protocols with different tradeoffs on network conditions and performance are proposed. The first one is based on a DHT concept which abbreviated as distributed hash table, by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary modification for real application, are supported by the simulations. But the DHT-based protocol incurs similar communication cost as previous techniques, it may be considered a little high for some scenarios. To overcome communication cost problem our second approach RDE/DDE distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.

Keywords: wireless sensor networks wsn, distributed hash table, randomly directed exploration

Edition: Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Share this Article

How to Cite this Article?

Aiswaria E S, "Enhanced Distributed Detection Protocol for Node Replication Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155573, Volume 4 Issue 6, June 2015, 1499 - 1503

55 PDF Views | 50 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'wireless sensor networks wsn'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1492 - 1499

Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique

Vinay Rana, Rani, Ravi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 326 - 330

An Energy-Efficient Algorithm Integrated with Target Tracking and Mobile Sensor Navigation

Amrutha Kakkoth, Rijin I K

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 838 - 842

Reliable Transmission with Fault Node Recovery Algorithm in Wireless Sensor Network

Ayesha Mulla, Komal Mohite, Madhuri Mane

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2320 - 2322

Survey on Data Collection Methods for Wireless Sensor Network

Soumya Dath G

Share this Article

Similar Articles with Keyword 'distributed hash table'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2993 - 2996

Survey Paper on Load Rebalancing for Distributed File Systems in Clouds

Juhi Shah, D. N. Rewadkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1034 - 1037

A Survey on Self-Destruction of Data Using Active Storage

Avinash P. Khadse, Prof. Pravin D. Soni

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1000 - 1004

Review on Detection of Clone Attacks inWireless Sensor Networks

Nikita R. Kitey, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 529 - 534

A Novel Approach of Node Clone Detection in Wireless Sensor Networks

G. David, K. Srujana

Share this Article

Similar Articles with Keyword 'randomly directed exploration'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1000 - 1004

Review on Detection of Clone Attacks inWireless Sensor Networks

Nikita R. Kitey, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 529 - 534

A Novel Approach of Node Clone Detection in Wireless Sensor Networks

G. David, K. Srujana

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article
Top