Manuscript Number : IJSRSET1625111
An Efficient Cloning Detection Protocol Using Distributed Hash Table for Cyber-Physical System in WSN
Authors(3) :-K. Sindhukavi, P. Brundha, P. J. Beslin Pajila
Wireless Sensor Networks consists of sensors which are distributed in an ad hoc manner. Various security mechanisms such as cryptography, authentication, confidentiality, and message integrity, have been proposed to avoid security threats such as message replay, and fabrication of messages. The existing system uses distributed Low-Storage Clone Detection protocol (LSCD) for WSNs. This protocol designs a detection route along the perpendicular direction of a known path with known nodes deployed in a ring path. However, in this a powerful adversary can also replicate node IDs, which leads to the need for improved clone detection. In order to overcome this, distributed hash table (DHT) based clone detection protocol is proposed that provides a checking system is constructed to catch cloned nodes. The protocol’s completion on memory consumption and a critical security metric are theoretically deduced through a probability model. The DHT-based protocol can catch node clone with the high- security level and holds strong resistance against adversary’s attacks.
K. Sindhukavi
Wireless Sensor Network Security, Clone Detection Protocol, Distributed Hash Table
Publication Details
Published in :
Volume 2 | Issue 5 | September-October 2016 Article Preview
PG Student, CSE, Anna University, Tirunelveli, Tamil Nadu, India
P. Brundha
CSE, Anna University, Tirunelveli, Tamil Nadu, India
P. J. Beslin Pajila
CSE, Anna University, Tirunelveli, Tamil Nadu, India
Date of Publication :
2016-10-31
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
481-486
Manuscript Number :
IJSRSET1625111
Publisher : Technoscience Academy
Journal URL :
https://ijsrset.com/IJSRSET1625111