Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical for large-scale, randomly deployed sensor networks. In the proposed system, using distributed clone detection protocol namely ercd (energy-efficient ring based clone detection) protocol which has two stages: witness selection and legitimacy verification for clone detection. In the modification process, the first one is based on a distributed hash table (dht) in which the chord algorithm which is used to detect the cloned node, every node is assigned with the random key, before it transmits the data it has to give its key which would be verified by the witness node. If the same key is been given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor-list containing all neighbor ids and its locations. We are implementing chord algorithm, by location based nodes identification, where every region/location will have a group leader. The group leader will generate a random number with the time stamp to the available nodes that are in that location. Witness nodes verify the random number and time stamp to detect the cloned node. The message is also encrypted for security purpose.
Authors and Affiliations
B Vignesh, B. A Shanmugavel, K Chandrasekar, K Sathyamoorthy, Dr. V. Subedha
Web Mining: Knowledge Discovery from Web Content
As the increase in the number of internet users, internet has becoming one of the rich source of data for knowledge discoveries and relevant information. Due to high diversity and dimensionality of data, knowledge disco...
Adsorption for Waste Gas Treatment: A Short Review
Removal of various gases from waste stream can be carried out by various methods. Absorption, biofiltration, catalytic beds are few options available for this. Many off gases like hydrogen sulphide, sulphur dioxide and...
Cloud Resource Virtualization: A Survey
Internet, it is a large collection of networks where resources are globally networked, in internet cloud computing plays a major role in order to share the data and one of the important technology in the cloud computing...
A Secure Intrusion Detection System for MANETS in Receiver Collisions
In this paper we mainly focusses on handling one of the drawbacks of Watchdog scheme to secure MANETs namely receiver collision. MANET is a collection of mobile nodes that forming a wired network. There are many challen...
A Survey on QOS Based Web Service Selection
The Web service has become an essential concern for developers. Users have to select a service from a number of available services that best fit for their use. It is hard to discover the most appropriate web service fro...