International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103 | Views: 167

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher | Sunita Nandagave


Abstract: The wireless sensor networks are characterized by resourse constraint and large scalability. The wireless sensor networks are used in many critical application like military, health care services, industrial sectors etc. where highly secure transmission of data is required. An essential primitive in security which is a building block for any security service is pair wise key establishment. Wireless sensor networks are susceptible to the attack like node clone attacks, and there are several distributed protocols were proposed to detect this attack. However, the proposed protocols require much strong supposition to be practical for large-scale, randomly deployed sensor networks. In this paper, the system proposes two novel node clone detection protocols with great efficiency on network performance and condition. The first protocol is derived from a distributed hash table (DHT), by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The performance of protocol is improved with the help of probability model by efficient storage consumption and reducing the high security level theoretically. Then resulting equations with required adjustment for real time application are supported by simulations. Although the DHT-based protocol requires same communication cost as previous protocols, but for some scenario it may be considered as little high. To deal this, the randomly directed exploration protocol is emerged which provides better communication performance for large scale sensor network by probabilistic directed forwarding technique with random initial direction and border determination. The results of simulation preserve the protocol design and show satisfactory node clone detection probability and its efficiency on communication overhead. At the end we will compare this proposed system with those of existing methods for different criteria such as network scalability, storage overhead, network connectivity, network resiliency and average secure path length, and it is expected that this system will definitely improve the overall performance of the network as compared to existing ones.


Keywords: Wireless sensor networks, Key pre-distribution, Key management, Network scalability, security


Edition: Volume 3 Issue 11, November 2014,


Pages: 2075 - 2077


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top