首页    期刊浏览 2025年09月17日 星期三
登录注册

文章基本信息

  • 标题:A Novel ARED Protocol for Detection of Clone Attacks in Wireless Sensor Networks
  • 本地全文:下载
  • 作者:A. Divia lakshmi ; M. Sudha
  • 期刊名称:Indian Journal of Innovations and Developments
  • 印刷版ISSN:2277-5382
  • 电子版ISSN:2277-5390
  • 出版年度:2015
  • 卷号:4
  • 期号:4
  • 页码:1-6
  • 语种:English
  • 出版社:Indian Society for Education and Environment
  • 摘要:Objectives: To develop a new technique that avoids the clone attack without affecting the performance of the wireless network. Methods: An Authentic, Randomized, Efficient, Distributed (ARED) protocol is introduced for detect the clone attacks from wireless sensor networks. This method does not require high memory and energy like other methods but provides high authentic context. The attractive feature of this method is that it detects the clones even before it is introduced into the network by the adversary. It provides continuous communication to the end users while detecting the clone attacks. Thus the system can be highly secured and can be used for the real time data acquisition systems. Findings: The proposed method achieves high performance in terms of end to end delay, packet delivery ratio and Throughput. Application/Improvements: The proposed detection mechanism is done by using Authentic, Randomized, Efficient, Distributed (ARED) protocol. It achieves high detection performance compared to the existing system.
  • 其他摘要:Objectives: To develop a new technique that avoids the clone attack without affecting the performance of the wireless network. Methods: An Authentic, Randomized, Efficient, Distributed (ARED) protocol is introduced for detect the clone attacks from wireless sensor networks. This method does not require high memory and energy like other methods but provides high authentic context. The attractive feature of this method is that it detects the clones even before it is introduced into the network by the adversary. It provides continuous communication to the end users while detecting the clone attacks. Thus the system can be highly secured and can be used for the real time data acquisition systems. Findings: The proposed method achieves high performance in terms of end to end delay, packet delivery ratio and Throughput. Application/Improvements: The proposed detection mechanism is done by using Authentic, Randomized, Efficient, Distributed (ARED) protocol. It achieves high detection performance compared to the existing system.
  • 关键词:Mobile Sensor Node; Memory; Private Key; Clone Attacks.
国家哲学社会科学文献中心版权所有