Open Access Open Access  Restricted Access Subscription or Fee Access

Node Clone Detection with Maximum Throughput and PDR in Wireless Sensor Network

Neenu George, T.K. Parani

Abstract


Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability. An efficient network comprises of both security and quality of services. Along with node clone detection the qos multicast routing protocol (MQOSPF), is used to provide the quality of services like throughput, packet delivery ratio.

Keywords


Wireless Sensor Networks (WSN), Distributed Hash Table, Randomly Directed Exploration, Quality of Service Path First (QoSPF).

Full Text:

PDF

References


Anis Koubâa1,2, Ricardo Severino1, Mário Alves1,Eduardo Tovar1,” Improving Quality-of-Service in Wireless Sensor Networks by mitigating “hidden-node collisions”,IEEE,2010

B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security Privacy, 2005, pp. 49–63.

C.Bekara And M.L.Maknavicius,”A new protocol for securing wsn against node replication attacks,”in third IEEE International Conference on wireless and mobile computing, networking and communications,2007,pp59-59

Chih-Jen Tseng Chyou-Hwa Chen(2012), “Multicastextensions to QOSPF”,in proc NSC 93-2213 e Volume 23,no.8 pp. 149-005.

H.Wen,J.Luo,L.Zhou,”Light weight and effective detection scheme for node clone attacks in wsn”, in proc IET wsn,2011.

.Stoica,R.Morris,,D.L.Nowell,D,R.Karger,M.F.Kaashoek,Hari Balakrishnan,”Chord:a scalable peer to peer look up protocol for internetapplications,‟IEEE/ACMTrans.Netw.,vol.11,no.1,pp,17-32,Feb.2003.

Kai Xing, X.Chen,D.H.C Du,F.Liu,”Real time detection of clone attacks in wireless sensor networks”, IEEE infocom,2008.

Mark A. Perillo and Wendi BHeinzelman“Wireless Sensor Network Protocols”,in IEEE info,2009

Peng Zhang, Raimo Kantola, Zhansong Ma (2009),”DesignAnd Implementation Of a NewRouting Simulator”,in proc. IEEE IPANA.communication Volume 45.no.9 pp 345-354.

Zhijun Li And Guang Gong, ”Randomly directed exploration: an efficient node clone detection protocol in wireless sensor network” ,in proc 5 th IEEE Trans.Volume 11,pp34-4..2009

Zhijun Li, Member, IEEE, and Guang Gong,,“.On the Node Clone Detection in Wireless Sensor Networks”, in proc 5th IEEE transactions,Volume 40,no.11,pp 17-23,2013.

www.wikipedia.com


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.