DISCOVERY OF REPLICA IN RADIO NETWORKS WITH PROFICIENT ENERGY AND BUFFER

Geeta ., P. Aparna

Abstract


While using the clone recognition protocol, we're outfitted for maximizing the clone recognition probability. Our objective must be to propose a distributed clone recognition protocol with random witness selection to be able to boost the clone recognition probability since the negative impact of network lifetime and the advantages of data buffer storage ought to be minimized. The ring structure facilitates energy-efficient data forwarding within the path for that witnesses combined with sink. We theoretically prove the suggested protocol is able to do 100 % clone recognition probability with trustful witnesses. Particularly, we exploit the place information of sensors at random select witnesses situated in a jewel ring place to be sure the authenticity of sensors also to report detected clone attacks. In addition, in many existing clone recognition protocols with random witness selection plan, the very best buffer storage of sensors is generally while using node density. Extensive simulations show our suggested protocol is able to do extended network lifetime by effectively disbursing the traffic load inside the network. The present system doesn't make certain that a number of within the witnesses can think about the identity within the sensor nodes to uncover whether there's a clone attack otherwise. The performance within the ERCD protocol is evaluated in relation to clone recognition probability, power consumption, network lifetime, and understanding buffer capacity. Extensive simulation results show our suggested ERCD protocol is able to do superior performance using the clone recognition probability and network lifetime with reasonable data buffer capacity.


Keywords


Wireless Sensor Networks; Clone Detection Protocol; Energy Efficiency; Network Lifetime

References


R. Lu,X. Lin, X.Liang, and X. Shen, “A dynamic privacy-preserving key management scheme for location based services in VANETs,” IEEETrans.Intell. Transp.Syst.,vol.13,no.1, pp.127–139, Jan. 2012.

M. Conti, R. D. Pietro, L. Mancini, and A. Mei, “Distributed detection of clone attacks in wireless sensor networks,” IEEE Trans. Dependable. Secure Comput .,vol.8,no.5, pp .685–698,Sep.-Oct.2011.

J. Li, J. Chen, and T. H. Lai, “Energy-efficient intrusion detection with a barrier of probabilistic sensors,” in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 25-30, 2012, pp. 118–126.

R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, “On the detection of clones in sensor networks using random key predistribution,” IEEE Trans. Syst., Man, Cybern., vol. 37, no. 6, pp. 1246–1258, Nov. 2007.

Q. Chen, S. S. Kanhere, and M. Hassan, “Analysis of per-node traffic load in multi-hop wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 958–967, Feb. 2009.

A. Liu, P. Zhang, and Z. Chen, “Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks,” J. Parallel Distrib. Comput., vol. 71, no. 10, pp. 1327–1355, Oct. 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.