Абстрактный

Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks

P.Hima Bindu, T. Venkata Naga Jayudu

Wireless sensor networks are resource constrained and vulnerable to various kinds of attacks. In this paper we study node clone attack. Many solutions came into existence and for detecting this attack. Many solutions need assumptions to have the problem solved in large-scale deployment of sensors. They have tradeoffs between the solutions provided and network conditions. Recently Li and Gong proposed two protocols for node clone detection with different tradeoffs with network conditions. Distributed Hash Table (DHT) was used to have distributed mechanisms for node clone detection. Due to the overhead caused by DHT, they proposed another protocol that overcomes this problem. In this paper, we implement a novel mechanism that can detect node clone attack in wireless sensor networks. We made simulations in NS2 to demonstrate the proof of concept.

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше