Author : Choudary Swetha 1
Date of Publication :16th May 2018
Abstract: In this paper, we support an energy-efficient location-conscious clone detection protocol in compactly deployed WSNs that may assurance successful clone assault detection and maintain exceptional network lifetime. In particular, we make the most the province facts of sensors and randomly pick witnesses placed in a ring region to confirm the legitimacy of sensors and to certificate detected clone attacks. The ring structure helps electricity-efficient records forwarding along the path in the direction of the witnesses and the sink. We tentatively prove that the anticipated protocol can obtain one hundred percent clone detection probability with trustful witnesses. In addition, we develop the work by way of reading the clone detection explain with untruthful witnesses and show that the clone detection prospect still strategies 98 percentage when 10 percentages of witnesses are compromised. furthermore, in maximum current clone detection protocols with random witness selection proposal, the required buffer garage of sensors is usually dependent on the node density, i.e., 0 √n, at the same time as in our projected protocol, the specified buffer garage of sensors is impartial of n but a characteristic of The hop period of the network radius h, i.e., 0(h). Widespread simulations display that our planned protocol can accomplish long network lifetime by using efficiently distribute the site visitor’s load crosswise the network.
Reference :
-
- Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in WSNs,” in Proc. IEEE INFOCOM, Apr. 14-19, 2013, pp. 2436–2444.
- R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,” IEEE Commun. Mag., vol. 49, no. 4, pp. 28–35, Apr. 2011.
- F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Netw., vol. 38, no. 4, pp. 393– 422, Mar. 2002.
- Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Comput. Netw., vol. 56, no. 7, pp. 1951–1967, May. 2012.
- T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, Jul. 2010.