mca 18(15): e5

Research Article

An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network

Download58 downloads
  • @ARTICLE{10.4108/eai.14-2-2019.156591,
        author={M. Thirunavukkarasan and S.A. Sahaaya Arul Mary},
        title={An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network},
        journal={EAI Endorsed Transactions on Mobile Communications and Applications},
        volume={4},
        number={15},
        publisher={EAI},
        journal_a={MCA},
        year={2018},
        month={12},
        keywords={Cloned nodes, Security in WSN, Wireless Adhoc Sensing Network (WASN), Intrusion Detection System (IDS) for WASN, Heterogeneous sensor network, single-sensing system, multiple sensing system},
        doi={10.4108/eai.14-2-2019.156591}
    }
    
  • M. Thirunavukkarasan
    S.A. Sahaaya Arul Mary
    Year: 2018
    An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network
    MCA
    EAI
    DOI: 10.4108/eai.14-2-2019.156591
M. Thirunavukkarasan1,*, S.A. Sahaaya Arul Mary2
  • 1: Research Scholar, Dept. of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli
  • 2: Professor & Head, Saranathan College of Engineering, Trichy
*Contact email: thirujpccse@gmail.com

Abstract

Detection of a cloned node intruder in Homogenous Wireless Sensor Networks has many useful applications in terms that they can be deployed in war zones for detecting intruder (enemies) and uniquely identifies them which help in preventing any harmful situation they can create when they continue to exist inside the system. This intrusion detection system is used to identify the mismatched, malicious, non-orientable nodes and false committing nodes. This paper, proposes a novel hub clone location convention method with various tradeoffs of execution and arranged conditions. First depends on a conveyed hash table, by which a completely decentralized, key-based storing and checking framework is developed to get cloned hubs successfully. Second depends on dispersed recognition convention, named arbitrarily coordinated investigation, introduces great correspondence execution for thick sensor systems, by a probabilistic coordinated sending method alongside irregular starting bearing and fringe assurance. The reproduction comes about maintain the convention outline and demonstrate its effectiveness on correspondence overhead and attractive identification probability.