Open Access Open Access  Restricted Access Subscription Access

A Novel ARED Protocol for Detection of Clone Attacks in Wireless Sensor Networks


Affiliations
1 Department of Computer Science, Bishop Appaswamy College, Coimbatore, India
 

Objectives: To develop a new technique that avoids the clone attack without affecting the performance of the wireless network.

Methods: An Authentic, Randomized, Efficient, Distributed (ARED) protocol is introduced for detect the clone attacks from wireless sensor networks. This method does not require high memory and energy like other methods but provides high authentic context. The attractive feature of this method is that it detects the clones even before it is introduced into the network by the adversary. It provides continuous communication to the end users while detecting the clone attacks. Thus the system can be highly secured and can be used for the real time data acquisition systems.

Findings: The proposed method achieves high performance in terms of end to end delay, packet delivery ratio and Throughput.

Application/Improvements: The proposed detection mechanism is done by using Authentic, Randomized, Efficient, Distributed (ARED) protocol. It achieves high detection performance compared to the existing system.


Keywords

Mobile Sensor Node, Memory, Private Key, Clone Attacks.
User
Notifications

Abstract Views: 340

PDF Views: 0




  • A Novel ARED Protocol for Detection of Clone Attacks in Wireless Sensor Networks

Abstract Views: 340  |  PDF Views: 0

Authors

A. Divia lakshmi
Department of Computer Science, Bishop Appaswamy College, Coimbatore, India
M. Sudha
Department of Computer Science, Bishop Appaswamy College, Coimbatore, India

Abstract


Objectives: To develop a new technique that avoids the clone attack without affecting the performance of the wireless network.

Methods: An Authentic, Randomized, Efficient, Distributed (ARED) protocol is introduced for detect the clone attacks from wireless sensor networks. This method does not require high memory and energy like other methods but provides high authentic context. The attractive feature of this method is that it detects the clones even before it is introduced into the network by the adversary. It provides continuous communication to the end users while detecting the clone attacks. Thus the system can be highly secured and can be used for the real time data acquisition systems.

Findings: The proposed method achieves high performance in terms of end to end delay, packet delivery ratio and Throughput.

Application/Improvements: The proposed detection mechanism is done by using Authentic, Randomized, Efficient, Distributed (ARED) protocol. It achieves high detection performance compared to the existing system.


Keywords


Mobile Sensor Node, Memory, Private Key, Clone Attacks.