Distributed Hash Table Protocol Detection in Wireless Sensor Networks

Download Now
Provided by: International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)
Topic: Security
Format: PDF
Wireless sensor networks are the weakest to the node clone, and several distributed protocols have been proposed to detect this attack. So, they require too strong assumptions to be practical for large scale, randomly deployed sensor networks. In this paper, to propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a Distributed Hash Table (DHT) in which chord algorithm is used to detect the cloned node, every node is assigned with unique key, and before it transmits the data it has to give its key which would be verified by the witness node.
Download Now

Find By Topic