Wireless Sensor Networks with Efficient Clone Detection in Terms of Energy and Memory
Keywords:
Wireless Sensor Networks, Clone Detection Protocol, Energy Efficiency, And Network LifetimeAbstract
We propose an energy-efficient location-aware clone detection protocol for densely deployed WSNs to ensure successful clone attack detection and satisfactory network lifetime. Using the sensors' geolocation data, we randomly select witnesses within a ring area to attest to the sensors' legitimacy and report any clone attacks they may have uncovered. The witnesses and the sink along the path can receive data with minimal power consumption thanks to the ring topology. For the first time, we theoretically show that the proposed protocol can achieve a clone detection probability of one hundred percent with trustworthy witnesses. In this expanded work, we examine clone detection performance with untrustful witnesses and find that, even with 10% of witnesses being compromised, the clone detection probability is still very close to 99%. The proposed protocol also requires buffer storage of sensors that depends not on the number of sensors, n, but on the network's radius, h, i.e. Oh, whereas the required buffer storage of sensors is typically dependent on the node density in existing clone detection protocols with random witness selection scheme. Extensive simulations show that our proposed protocol can ensure a long network lifetime by evenly distributing the traffic load across the network.
References
- Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,” in Proc. IEEE INFOCOM, Turin, IT, Apr. 14- 19 2015, pp. 2436–2444.
- R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,” IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013.
- Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSN”, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19
- Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011.
- T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010.
- Uma Vasala and Dr. G. R. Sakthidharan,” Effective Key Management In Dynamic Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308- 312, 2017.
- K.MANIMALA and .RANJITH,” Mobile Transmission Using Rigorous Data for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436- 446, 2014.
- P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,” Developing An Enterprise Environment by Using Wireless Sensor Network System Architecture”..”International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902- 908, 2015.
- JALAGAM NAGAMANI, K.SUMALATHA,” EAACK: Secure IDS for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461- 469, 2014.
- G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and P.SUMAN PRAKASH,” Significance of DSSD towards Cut Detection in Wireless Sensor Network”..”International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.