首页    期刊浏览 2025年02月28日 星期五
登录注册

文章基本信息

  • 标题:Network Security by Detecting Clone Node Using RSA Bitmap and DHT
  • 本地全文:下载
  • 作者:Dr. R. Udayakumar ; P. Gayathri
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:1
  • DOI:10.15680/ijircce.2015.0301135
  • 出版社:S&S Publications
  • 摘要:Wireless Sensor Network which is susceptible to the node clone, and quite a few distributed protocolshave been planned to notice this attack. However, they need too strong assumptions to be practical for large-scale,randomly organized sensor networks. In this the data send by the source will be send in an image format as bitmapformat. By using RSA algorithm the input is converted into bitmap format, the input data will be assigned with key sothat the security will be strong only the destination will know the key and the source will decrypt the image and getthe file. In this paper, we put forward two novel node clone detection protocols with dissimilar tradeoffs on net workconditions and performance. First one is based on a distributed hash table (DHT), by which a completely decentralized,key-based caching and inspection system is demonstrated to obtain cloned nodes capably. The protocol presentation onefficient storage space consumption and high security level is theoretically deducted through a probability model, andthe resulting equations, with essential adjustments for real application, are supported by the simulations. To address thisconcern, our second distributed detection protocol, named randomly directed exploration, presents high-qualitycommunication performance for solid sensor networks, by a probabilistic bound for forwarding method all along withrandom initial direction and border determination. . The simulation results support the protocol design and demonstrateits effectiveness on communication overhead and satisfactory detection probability.
  • 关键词:Wireless Sensor Network; Distributed detection; distributed hash table; node clone attack; randomly;directed exploration; RSA Algorithm
国家哲学社会科学文献中心版权所有