Volume 24, Issue 1, June 2016, Pages 46–56
R. Ramalakshmi1, S. Subash Prabhu2, and C. Balasubramanian3
1 PG scholar Dept. of CSE, P.S.R.R college of Engg, Sivakasi, India
2 Asst. Prof Dept Of CSE, P.S.R.R college of Engg, Sivakasi, India
3 Prof. and head of CSE, P.S.R.R college of Engg, Sivakasi, India
Original language: English
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless sensor network consists of entity nodes that are able to work together with their surroundings by sensing or scheming corporeal parameters. The major issue in wsn is information accessed by unauthorized party by clone node. Once a node is captured, the attacker can reprogram and then take over the network process. The proposed algorithm is chord and DHT (Distributed hash table).The RDE protocol is used to detect clone node and chord algorithm provides the neighbor details. The DHT is used to store the node ID, key, location and source ID, destination ID. Here every node is assigned with a unique key which is verified by a witness node before transmitting data. A distributed detection protocol, known as randomly directed exploration (RDE), presents outstanding communication performance and minimal storage consumption for dense sensor networks. It is a location based node identification protocol. The group leader will be generating random number with appropriate location. Witness node are used to verify the random number detect the clone.
Author Keywords: witness node, randomly distributed efficient, chord ring.
R. Ramalakshmi1, S. Subash Prabhu2, and C. Balasubramanian3
1 PG scholar Dept. of CSE, P.S.R.R college of Engg, Sivakasi, India
2 Asst. Prof Dept Of CSE, P.S.R.R college of Engg, Sivakasi, India
3 Prof. and head of CSE, P.S.R.R college of Engg, Sivakasi, India
Original language: English
Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Wireless sensor network consists of entity nodes that are able to work together with their surroundings by sensing or scheming corporeal parameters. The major issue in wsn is information accessed by unauthorized party by clone node. Once a node is captured, the attacker can reprogram and then take over the network process. The proposed algorithm is chord and DHT (Distributed hash table).The RDE protocol is used to detect clone node and chord algorithm provides the neighbor details. The DHT is used to store the node ID, key, location and source ID, destination ID. Here every node is assigned with a unique key which is verified by a witness node before transmitting data. A distributed detection protocol, known as randomly directed exploration (RDE), presents outstanding communication performance and minimal storage consumption for dense sensor networks. It is a location based node identification protocol. The group leader will be generating random number with appropriate location. Witness node are used to verify the random number detect the clone.
Author Keywords: witness node, randomly distributed efficient, chord ring.
How to Cite this Article
R. Ramalakshmi, S. Subash Prabhu, and C. Balasubramanian, “DETECTION OF COLLUSION ATTACK IN WIRELESS SENSOR NETWORK USING RDE PROTOCOL AND CHORD ALGORITHM,” International Journal of Innovation and Scientific Research, vol. 24, no. 1, pp. 46–56, June 2016.