Energy and Memory Clone Detection in Wireless Sensor Network

Main Article Content

Mr. Amatul Mateen Shamsiya
Dr. G.S.S Rao

Abstract

An associate degree energy-efficient location-aware clone detection protocol is planned in densely deployed WSNs, which may guarantee productive clone attack detection and maintain satisfactory network life. Specifically, the situation info of sensors is employed and every which way choose witnesses situated in an exceedingly ring space to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient information forwarding on the trail towards the witnesses and also the sink. Planned protocol are able to do one hundred clone detection likelihood with unsuspicious witnesses. Moreover, in most existing clone detection protocols with random witness choice theme, the desired buffer of sensors is typically keen about the node density, whereas, in the planned protocol, the desired buffer of sensors is freelance of hop length of the network radius. Planned protocol are able to do long network life by effectively distributing the traffic load across the network.

Article Details

How to Cite
[1]
Mr. Amatul Mateen Shamsiya and Dr. G.S.S Rao, “Energy and Memory Clone Detection in Wireless Sensor Network”, Int. J. Comput. Eng. Res. Trends, vol. 4, no. 10, pp. 413–418, Oct. 2017.
Section
Research Articles

References

Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,†in Proc. IEEE INFOCOM, Turin, IT, Apr. 14-19 2015, pp. 2436–2444.

R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,†IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013.

Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSNâ€, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19

Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,†Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011.

T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,†IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010.

Uma Vasala and Dr. G. R. Sakthidharan,†Effective Key Management In Dynamic Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308-312, 2017.

K.MANIMALA and .RANJITH,†Mobile Transmission Using Rigorous Data for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436-446, 2014.

P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,†Developing An Enterprise Environment by Using Wireless Sensor Network System Architectureâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902-908, 2015.

JALAGAM NAGAMANI, K.SUMALATHA,†EAACK: Secure IDS for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461-469, 2014.

G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and P.SUMAN PRAKASH,†Significance of DSSD towards Cut Detection in Wireless Sensor Networkâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015.

Kumara Swamy,E Ramya,†A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 834-836, 2015.

Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil,†Prevention of Packet Hiding Methods In Selective Jamming Attackâ€..â€International Journal of Computer Engineering in Research Trends., vol.3, no.4, pp. 194-196, 2016.

Most read articles by the same author(s)