Two Novel Approaches on the Node Clone Detection in Wireless Sensor Networks

Download Now
Provided by: International Journal on Computer Science and Technology (IJCST)
Topic: Networking
Format: PDF
"Wireless Sensor Networks (WSNs) are vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. In this paper, it presents two novel, practical node clone detection protocols with different tradeoffs on network conditions and performance. The first proposal is based on a Distributed Hash Table (DHT) by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes. The protocol's performance on memory consumption and a critical security metric are theoretically deducted through a probability model, and the resulting equations, with necessary adjustment for real application, are supported by the simulations."
Download Now

Find By Topic