2020
DOI: 10.1088/1757-899x/993/1/012067
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Wireless Sensor Network to Enhance Network Security by Detecting Clone Nodes

Abstract: For replica identification and clone detection a centralized system is proposed in this research, where the network has been separated into inspection node and segments. A clone node can be identified by checking the inspection nodes ID along with the Network security (Cryptographic) key. Detection of clone node done using Chord algorithm, where each and every node in the network have assigned with a unique keygenerated at random. Before the data transmission, it has been given with its key and the assigned ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The shortest path will not be applicable because the capacity for providing the required bandwidth may not be possible all the time [5]. One of the significant goals of QoS is to find the determined path from the Source node to the destination node which should sacrifice its needs for attaining the desired QoS [13]. The route in QoS is based on certain conditions traffic and distance consideration, and minimal search.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The shortest path will not be applicable because the capacity for providing the required bandwidth may not be possible all the time [5]. One of the significant goals of QoS is to find the determined path from the Source node to the destination node which should sacrifice its needs for attaining the desired QoS [13]. The route in QoS is based on certain conditions traffic and distance consideration, and minimal search.…”
Section: A Related Workmentioning
confidence: 99%
“…2 chromosomes are selected by the crossover operator and genetic information of the chromosomes is swapped to produce a new chromosome. (Vimala et al, 2017) [13] In the mutation process the operator tries to bring in a new genetic structure this is done by modifying the gene also helps the search algorithm to escape from the pressure of local optimums. In this, the GA has the capability of changing the whole population or the limited member.…”
Section: Gaman Algorithmmentioning
confidence: 99%