This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
On The Node Clone Detection Using DHT And RDE
Authors
  S.Sathiya,  K.Suganthi,  R.Venkatesh
Abstract
A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. In this paper, we propose two novel node clone detection protocols. The first one is based on a distributed hash table (DHT), which is fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Our second distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks.
Keywords- Distributed hash table, node clone attack, randomly directed exploration; wireless sensor networks (WSNs).
Publication Details
Unique Identification Number - IJEDR1401167Page Number(s) - 928-931Pubished in - Volume 2 | Issue 1 | March 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  S.Sathiya,  K.Suganthi,  R.Venkatesh,   "On The Node Clone Detection Using DHT And RDE", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 1, pp.928-931, March 2014, Available at :http://www.ijedr.org/papers/IJEDR1401167.pdf
Article Preview
|
|
||||||
|