Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Node Clone Detection with Maximum throughput and PDR in Wireless Sensor Network


Affiliations
1 ECE Department, Dhanalakshmi Srinivasan College of Engineering, Anna University, Coimbatore, Tamilnadu, India
     

   Subscribe/Renew Journal


Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability. An efficient network comprises of both security and quality of services. Along with node clone detection the qos multicast routing protocol (MQOSPF), is used to provide the quality of services like throughput, packet delivery ratio.

Keywords

Wireless Sensor Networks (WSN), Distributed Hash Table, Randomly Directed Exploration, Quality of Service Path First (QoSPF).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 140

PDF Views: 1




  • Node Clone Detection with Maximum throughput and PDR in Wireless Sensor Network

Abstract Views: 140  |  PDF Views: 1

Authors

Neenu George
ECE Department, Dhanalakshmi Srinivasan College of Engineering, Anna University, Coimbatore, Tamilnadu, India
T. K. Parani
ECE Department, Dhanalakshmi Srinivasan College of Engineering, Anna University, Coimbatore, Tamilnadu, India

Abstract


Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability. An efficient network comprises of both security and quality of services. Along with node clone detection the qos multicast routing protocol (MQOSPF), is used to provide the quality of services like throughput, packet delivery ratio.

Keywords


Wireless Sensor Networks (WSN), Distributed Hash Table, Randomly Directed Exploration, Quality of Service Path First (QoSPF).