Energy and Memory Clone Detection in Wireless Sensor Network
Main Article Content
Abstract
An associate degree energy-efficient location-aware clone detection protocol is planned in densely deployed WSNs, which may guarantee productive clone attack detection and maintain satisfactory network life. Specifically, the situation info of sensors is employed and every which way choose witnesses situated in an exceedingly ring space to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient information forwarding on the trail towards the witnesses and also the sink. Planned protocol are able to do one hundred clone detection likelihood with unsuspicious witnesses. Moreover, in most existing clone detection protocols with random witness choice theme, the desired buffer of sensors is typically keen about the node density, whereas, in the planned protocol, the desired buffer of sensors is freelance of hop length of the network radius. Planned protocol are able to do long network life by effectively distributing the traffic load across the network.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,†in Proc. IEEE INFOCOM, Turin, IT, Apr. 14-19 2015, pp. 2436–2444.
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,†IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013.
Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSNâ€, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19
Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,†Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011.
T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,†IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010.
Uma Vasala and Dr. G. R. Sakthidharan,†Effective Key Management In Dynamic Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308-312, 2017.
K.MANIMALA and .RANJITH,†Mobile Transmission Using Rigorous Data for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436-446, 2014.
P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,†Developing An Enterprise Environment by Using Wireless Sensor Network System Architectureâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902-908, 2015.
JALAGAM NAGAMANI, K.SUMALATHA,†EAACK: Secure IDS for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461-469, 2014.
G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and P.SUMAN PRAKASH,†Significance of DSSD towards Cut Detection in Wireless Sensor Networkâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015.
Kumara Swamy,E Ramya,†A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 834-836, 2015.
Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil,†Prevention of Packet Hiding Methods In Selective Jamming Attackâ€..â€International Journal of Computer Engineering in Research Trends., vol.3, no.4, pp. 194-196, 2016.