Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

0
684
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Abstract

In this Energy and Memory Efficient Clone Detection in Wireless Sensor Networks paper, we propose an energy-efficient location-aware clone detection protocol in densely deployed WSNs that can guarantee successful clone attack detection and maintain satisfactory network lifetime.

Specifically, we use sensor location information and randomly select witnesses located in a ring area to verify sensor legitimacy and report detected clone attacks. The ring structure facilitates energy-efficient data transmission along the path towards the witnesses and the sink.

Theoretically, we prove that the proposed protocol can achieve a 100 percent probability of clone detection with trusted witnesses. We further extend the work by studying the performance of clone detection with untrustful witnesses and show that when 10 percent of witnesses are compromised, the probability of clone detection still approaches 98 percent.

In addition, in most existing clone detection protocols with random witness selection schemes, the required buffer storage of sensors is usually dependent on node density, i.e., O(n−м), while in our proposed protocol, the required buffer storage of sensors is independent of n but depends on the hop length of the network radius h, i.e., O(h).

Conclusion

In this paper, we planned distributed energy-efficient clone detection protocol with random witness choice.Specifically, we planned the ERCD protocol with the selection of the witness and the verification of legitimacy stages.In addition, our protocol is able to achieve higher network life and total energy consumption with the info buffer’s affordable storage capability.

This can be because we tend to cash in the situation information by distributing the traffic load everywhere WSNs, thus mitigating the energy consumption and memory storage of the sensing element nodes around the sink node and also extending the network life.

We will contemplate completely different quality patterns under varied network eventualities in our future work. Networks of sensing elements are liable to attack node replication. We tend to propose four distributed protocols during this paper to detect these malicious attacks.