TAILIEUCHUNG - Secured clone detection using witness head selection to avoid malicious nodes in WSN

The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network. | ISSN:2249-5789 Nadiya N et al, International Journal of Computer Science & Communication Networks,Vol 7(3),46-51 Secured Clone Detection using Witness Head Selection to Avoid Malicious Nodes in WSN Nadiya N , DCN Department of Telecommunication Engineering Dr. AIT, Bangalore nnadiya646@ Abstract—An energy-efficient location-aware clone attack detection protocol is determined and generally deployed Wireless Sensor Networks, which can certify great clone attack detection. The ring structure helps energy-efficient data information, forwarding along the path towards the witness nodes and the sink node. The localization information of each sensor node forward its private information to randomly selected witness nodes which are present in a ring structure area to verify the legitimacy of sensor nodes and to report detected clone attacks. The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network. Index Terms—Wireless Sensor Networks, Clone Detection protocol, Energy-memory efficient, Network Lifetime, Secure data I. INTRODUCTION Now a day’s world is changing dynamically and Wireless Sensor Networks (WSN) has become an important part of communication media, and it is used for a variety of applications that are military, beginning of environment monitoring, etc., [1], [2], [3]. A WSN generally consists of a Base Station and several numbers of sensor nodes. Where geographical areas observed by sensor nodes and later these nodes gathers sensor data information. The base station is a main for collecting information from sensor nodes throughout wireless media hop by hop. Then base station send collected data information to user through the internet.

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.