Node clone detection using a stable overlay network

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data‟s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.

Cite

CITATION STYLE

APA

Chelliah, B. J., Antony Vigil, M. S., & Bennet Praba, M. S. (2020). Node clone detection using a stable overlay network. International Journal of Electrical and Computer Engineering, 10(1), 316–322. https://doi.org/10.11591/ijece.v10i1.pp316-322

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free