Back to Current Issues

Energy and Memory Clone Detection in Wireless Sensor Network

Mr. Amatul Mateen Shamsiya, Dr. G.S.S Rao,

Affiliations
Nawab ShahAlam khan College of Engineering and Technology, Hyd
:10.22362/ijcert/2017/v4/i10/xxxx [UNDER PROCESS]


Abstract
An associate degree energy-efficient location-aware clone detection protocol is planned in densely deployed WSNs, which may guarantee productive clone attack detection and maintain satisfactory network life. Specifically, the situation info of sensors is employed and every which way choose witnesses situated in an exceedingly ring space to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient information forwarding on the trail towards the witnesses and also the sink. Planned protocol are able to do one hundred clone detection likelihood with unsuspicious witnesses. Moreover, in most existing clone detection protocols with random witness choice theme, the desired buffer of sensors is typically keen about the node density, whereas, in the planned protocol, the desired buffer of sensors is freelance of hop length of the network radius. Planned protocol are able to do long network life by effectively distributing the traffic load across the network.


Citation
Amatul Mateen Shamsiya and Dr. G.S.S Rao (2017). Energy and Memory Clone Detection in Wireless Sensor Network . International Journal of Computer Engineering In Research Trends, 4(10), 413-418. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I1007.pdf


Keywords : wireless sensor networks, clone detection protocol, energy efficiency, and network lifetime

References
[1] Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,” in Proc. IEEE INFOCOM, Turin, IT, Apr. 14-19 2015, pp. 2436–2444. 
[2] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,” IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013. 
[3] Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSN”, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19 
[4] Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011. 
[5] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010.
[6] Uma Vasala and Dr. G. R. Sakthidharan,” Effective Key Management In Dynamic Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308-312, 2017.
[7] K.MANIMALA and .RANJITH,” Mobile Transmission Using Rigorous Data for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436-446, 2014.

[8] P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,” Developing An Enterprise Environment by Using Wireless Sensor Network System Architecture”..”International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902-908, 2015.

[9]  JALAGAM NAGAMANI, K.SUMALATHA,” EAACK: Secure IDS for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461-469, 2014.

[10] G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and  P.SUMAN PRAKASH,” Significance of DSSD towards Cut Detection in Wireless Sensor Network”..”International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015.

[11] Kumara Swamy,E Ramya,” A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 834-836, 2015.

[12] Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil,” Prevention of Packet Hiding Methods In Selective Jamming Attack”..”International Journal of Computer Engineering in Research Trends., vol.3, no.4, pp. 194-196, 2016.


DOI Link : Not yet assigned

Download :
  V4I1007.pdf


Refbacks : Currently there are no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>