Đang chuẩn bị liên kết để tải về tài liệu:
Secured clone detection using witness head selection to avoid malicious nodes in WSN
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network. | ISSN:2249-5789 Nadiya N et al, International Journal of Computer Science & Communication Networks,Vol 7(3),46-51 Secured Clone Detection using Witness Head Selection to Avoid Malicious Nodes in WSN Nadiya N M.Tech, DCN Department of Telecommunication Engineering Dr. AIT, Bangalore nnadiya646@gmail.com Abstract—An energy-efficient location-aware clone attack detection protocol is determined and generally deployed Wireless Sensor Networks, which can certify great clone attack detection. The ring structure helps energy-efficient data information, forwarding along the path towards the witness nodes and the sink node. The localization information of each sensor node forward its private information to randomly selected witness nodes which are present in a ring structure area to verify the legitimacy of sensor nodes and to report detected clone attacks. The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network. Index Terms—Wireless Sensor Networks, Clone Detection protocol, Energy-memory efficient, Network Lifetime, Secure data I. INTRODUCTION Now a day’s world is changing dynamically and Wireless Sensor Networks (WSN) has become an important part of communication media, and it is used for a variety of applications that are military, beginning of environment monitoring, etc., [1], [2], [3]. A WSN generally consists of a Base Station and several numbers of sensor nodes. Where geographical areas observed by sensor nodes and later these nodes gathers sensor data information. The base station is a main for collecting information from sensor nodes throughout wireless media hop by hop. Then base station send collected data information to user through the internet.