An approach toward the optimization of witness based node clone attack
In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some efficient protocol like LSM and RED under the category of witness based node clone...
Saved in:
Published in | 2015 Third International Conference on Image Information Processing (ICIIP) pp. 506 - 510 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some efficient protocol like LSM and RED under the category of witness based node clone detection. We have analyzed the detection level, memory, and energy overhead of LSM, RED and proposed protocol. We have presented an approach for the optimization of witness based distributed node clone detection. For the validation of proposed protocol performance, we have provided mathematical as well as simulation results for the various parameters of the WSN. |
---|---|
DOI: | 10.1109/ICIIP.2015.7414825 |