The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: To develop a new technique that avoids the clone attack without affecting the performance of the wireless network.

Methods: An Authentic, Randomized, Efficient, Distributed (ARED) protocol is introduced for detect the clone attacks from wireless sensor networks. This method does not require high memory and energy like other methods but provides high authentic context. The attractive feature of this method is that it detects the clones even before it is introduced into the network by the adversary. It provides continuous communication to the end users while detecting the clone attacks. Thus the system can be highly secured and can be used for the real time data acquisition systems.

Findings: The proposed method achieves high performance in terms of end to end delay, packet delivery ratio and Throughput.

Application/Improvements: The proposed detection mechanism is done by using Authentic, Randomized, Efficient, Distributed (ARED) protocol. It achieves high detection performance compared to the existing system.


Keywords

Mobile Sensor Node, Memory, Private Key, Clone Attacks.
User
Notifications