{"title":"同构无线传感器网络克隆节点入侵检测的一种创新安全方法","authors":"M. Thirunavukkarasan, S. Mary","doi":"10.4108/eai.14-2-2019.156591","DOIUrl":null,"url":null,"abstract":"Detection of a cloned node intruder in Homogenous Wireless Sensor Networks has many useful applications in terms that they can be deployed in war zones for detecting intruder (enemies) and uniquely identifies them which help in preventing any harmful situation they can create when they continue to exist inside the system. This intrusion detection system is used to identify the mismatched, malicious, non-orientable nodes and false committing nodes. This paper, proposes a novel hub clone location convention method with various tradeoffs of execution and arranged conditions. First depends on a conveyed hash table, by which a completely decentralized, key-based storing and checking framework is developed to get cloned hubs successfully. Second depends on dispersed recognition convention, named arbitrarily coordinated investigation, introduces great correspondence execution for thick sensor systems, by a probabilistic coordinated sending method alongside irregular starting bearing and fringe assurance. The reproduction comes about maintain the convention outline and demonstrate its effectiveness on correspondence overhead and attractive identification probability.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network\",\"authors\":\"M. Thirunavukkarasan, S. Mary\",\"doi\":\"10.4108/eai.14-2-2019.156591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detection of a cloned node intruder in Homogenous Wireless Sensor Networks has many useful applications in terms that they can be deployed in war zones for detecting intruder (enemies) and uniquely identifies them which help in preventing any harmful situation they can create when they continue to exist inside the system. This intrusion detection system is used to identify the mismatched, malicious, non-orientable nodes and false committing nodes. This paper, proposes a novel hub clone location convention method with various tradeoffs of execution and arranged conditions. First depends on a conveyed hash table, by which a completely decentralized, key-based storing and checking framework is developed to get cloned hubs successfully. Second depends on dispersed recognition convention, named arbitrarily coordinated investigation, introduces great correspondence execution for thick sensor systems, by a probabilistic coordinated sending method alongside irregular starting bearing and fringe assurance. The reproduction comes about maintain the convention outline and demonstrate its effectiveness on correspondence overhead and attractive identification probability.\",\"PeriodicalId\":299985,\"journal\":{\"name\":\"EAI Endorsed Trans. Mob. Commun. Appl.\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EAI Endorsed Trans. Mob. Commun. Appl.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/eai.14-2-2019.156591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Trans. Mob. Commun. Appl.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.14-2-2019.156591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network
Detection of a cloned node intruder in Homogenous Wireless Sensor Networks has many useful applications in terms that they can be deployed in war zones for detecting intruder (enemies) and uniquely identifies them which help in preventing any harmful situation they can create when they continue to exist inside the system. This intrusion detection system is used to identify the mismatched, malicious, non-orientable nodes and false committing nodes. This paper, proposes a novel hub clone location convention method with various tradeoffs of execution and arranged conditions. First depends on a conveyed hash table, by which a completely decentralized, key-based storing and checking framework is developed to get cloned hubs successfully. Second depends on dispersed recognition convention, named arbitrarily coordinated investigation, introduces great correspondence execution for thick sensor systems, by a probabilistic coordinated sending method alongside irregular starting bearing and fringe assurance. The reproduction comes about maintain the convention outline and demonstrate its effectiveness on correspondence overhead and attractive identification probability.