Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Taws:Table Assisted Walk Strategy in Clone Attack Detection


Affiliations
1 Department of Computer Science and Engineering, C.S.I. Institute of Technology, India
2 Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, India
     

   Subscribe/Renew Journal


Wireless Sensor Networks (WSNs) deployed in the destructive atmosphere are susceptible to clone attacks. Clone attack in wireless sensor network is a complicated problem because it deployed in hostile environments, and also the nodes could be physically compromised by an adversary. For valuable clone attack detection, the selection criteria play an important role in the proposed work. In this paper, it has been classified the existing detection schemes regarding device type, detection methodologies, deployment strategies and detection ranges and far explore various proposals in deployment based selection criteria category. And also this paper provides a review of detection methodology based on various clone attack detection techniques. It is also widely agreed that clones should be detected quickly as possible with the best optional. Our work is exploratory in that the proposed algorithm concern with table assisted random walk with horizontal and vertical line, frequent level key change and revokes the duplicate node.Our simulation results show that it is more efficient than the detection criteria in terms of security feature, and in detection rate with high resiliency. Specifically, it concentrates on deployment strategy which includes grid based deployment technique. These all come under the selection criteria for better security performance. Our protocol analytically provides effective and clone attack detection capability of robustness.

Keywords

Clone Attacks, Wireless Sensor Networks, Node Replication Detection.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 230

PDF Views: 0




  • Taws:Table Assisted Walk Strategy in Clone Attack Detection

Abstract Views: 230  |  PDF Views: 0

Authors

J. Sybi Cynthia
Department of Computer Science and Engineering, C.S.I. Institute of Technology, India
D. Shalini Punithavathani
Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, India

Abstract


Wireless Sensor Networks (WSNs) deployed in the destructive atmosphere are susceptible to clone attacks. Clone attack in wireless sensor network is a complicated problem because it deployed in hostile environments, and also the nodes could be physically compromised by an adversary. For valuable clone attack detection, the selection criteria play an important role in the proposed work. In this paper, it has been classified the existing detection schemes regarding device type, detection methodologies, deployment strategies and detection ranges and far explore various proposals in deployment based selection criteria category. And also this paper provides a review of detection methodology based on various clone attack detection techniques. It is also widely agreed that clones should be detected quickly as possible with the best optional. Our work is exploratory in that the proposed algorithm concern with table assisted random walk with horizontal and vertical line, frequent level key change and revokes the duplicate node.Our simulation results show that it is more efficient than the detection criteria in terms of security feature, and in detection rate with high resiliency. Specifically, it concentrates on deployment strategy which includes grid based deployment technique. These all come under the selection criteria for better security performance. Our protocol analytically provides effective and clone attack detection capability of robustness.

Keywords


Clone Attacks, Wireless Sensor Networks, Node Replication Detection.