Research Article
An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network
@ARTICLE{10.4108/eai.14-2-2019.156591, author={M. Thirunavukkarasan and S.A. Sahaaya Arul Mary}, title={An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network}, journal={EAI Endorsed Transactions on Mobile Communications and Applications}, volume={4}, number={15}, publisher={EAI}, journal_a={MCA}, year={2018}, month={12}, keywords={Cloned nodes, Security in WSN, Wireless Adhoc Sensing Network (WASN), Intrusion Detection System (IDS) for WASN, Heterogeneous sensor network, single-sensing system, multiple sensing system}, doi={10.4108/eai.14-2-2019.156591} }
- M. Thirunavukkarasan
S.A. Sahaaya Arul Mary
Year: 2018
An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network
MCA
EAI
DOI: 10.4108/eai.14-2-2019.156591
Abstract
Detection of a cloned node intruder in Homogenous Wireless Sensor Networks has many useful applications in terms that they can be deployed in war zones for detecting intruder (enemies) and uniquely identifies them which help in preventing any harmful situation they can create when they continue to exist inside the system. This intrusion detection system is used to identify the mismatched, malicious, non-orientable nodes and false committing nodes. This paper, proposes a novel hub clone location convention method with various tradeoffs of execution and arranged conditions. First depends on a conveyed hash table, by which a completely decentralized, key-based storing and checking framework is developed to get cloned hubs successfully. Second depends on dispersed recognition convention, named arbitrarily coordinated investigation, introduces great correspondence execution for thick sensor systems, by a probabilistic coordinated sending method alongside irregular starting bearing and fringe assurance. The reproduction comes about maintain the convention outline and demonstrate its effectiveness on correspondence overhead and attractive identification probability.
Copyright © 2018 M.Thirunavukkarasan et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.