期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:1
DOI:10.15680/ijircce.2015.0301135
出版社:S&S Publications
摘要:Wireless Sensor Network which is susceptible to the node clone, and quite a few distributed protocolshave been planned to notice this attack. However, they need too strong assumptions to be practical for large-scale,randomly organized sensor networks. In this the data send by the source will be send in an image format as bitmapformat. By using RSA algorithm the input is converted into bitmap format, the input data will be assigned with key sothat the security will be strong only the destination will know the key and the source will decrypt the image and getthe file. In this paper, we put forward two novel node clone detection protocols with dissimilar tradeoffs on net workconditions and performance. First one is based on a distributed hash table (DHT), by which a completely decentralized,key-based caching and inspection system is demonstrated to obtain cloned nodes capably. The protocol presentation onefficient storage space consumption and high security level is theoretically deducted through a probability model, andthe resulting equations, with essential adjustments for real application, are supported by the simulations. To address thisconcern, our second distributed detection protocol, named randomly directed exploration, presents high-qualitycommunication performance for solid sensor networks, by a probabilistic bound for forwarding method all along withrandom initial direction and border determination. . The simulation results support the protocol design and demonstrateits effectiveness on communication overhead and satisfactory detection probability.