|CLONE ATTACK DETECTION IN COMPLEX NETWORK USING OVERLAPPING COMMUNITIES(DCA)|
|Ronika Devi, Mohit trehan|
|Cite This Article:|
CLONE ATTACK DETECTION IN COMPLEX NETWORK USING OVERLAPPING COMMUNITIES(DCA), International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 10 ,Page(s):160-163 ,February 2019 ,Available :IJIRT147630_PAPER.pdf
|DCA, WSN, clone detection|
|In today's world the wireless sensor network has great significant in application like defense surveillance, patient health monitoring, traffic control etc. As WSN utilize radio frequencies so there is threat of interference in network. These threats also include distributed denial of service in which the messages that are sent over the network may be attacked by unauthorized user. It would harm the confidentiality of the network user and the services of network. There are various algorithm that are utilized to detect clone attack in WSN but these schemes only stress on prevention of attack after it is occurred. This would leads to the loss of data and more consumption of limited network resources. So in this paper we introduce a new algorithm that is based on DCA along with random walk detection. It would detect earlier the clone attack in WSN and prevent the data loss. The performance of this technique has been analyzed by using parameters like packet delivery ratio, energy consumption by network, throughput.|
|Unique Paper ID: 147630|
Publication Volume & Issue: Volume 5, Issue 10
Page(s): 160 - 163
|Article Preview & Download|
Heat Transfer Augmentation Using Twisted Tape Inse...
Paper ID : IJIRT148786
SOFTWARE ARCHITECTURAL STYLES IN THE INTERNET OF T...
Paper ID : IJIRT148785
Comprehensive Analysis of Energy Aware Clustering ...
Paper ID : IJIRT148784
Performance Analysis of Solar Water Heater Evacuat...
Paper ID : IJIRT148783
A Practical Guide to live a Great Life in 2020 & b...
Paper ID : IJIRT148781