Comparing UWDBCSN Clustering with LNCA for Node Replication Attack
Clustering in WSN divides sensor nodes into different clusters. Each node is headed by a cluster head. Instead of direct routing, the communication can take place between cluster heads that increases the lifetime of sensor network. Some security issues in clustering may arise because of the presence of attacker node(s) in the network. Attacker nodes may disrupt the whole cluster by introducing attacks like node replication, denial of service, wormhole, malicious node etc. In node replication attack, attacker may capture a sensor node, extract all the information and generate the replica inside the cluster. In this work, UWDBCSN algorithm is used for clustering in which replicas are detected using Dydog mechanism and sleep/wake scheduling algorithm is used to enhance the performance of network. We also compared our approach with LNCA node replica detection algorithm.
Keywords: UWDBCSN, sleep/wake scheduling algorithm, node replication attack, detection, Dydog algorithmCite this Article
Harpreet Kaur, Sharad Saxena. Comparing UWDBCSN Clustering with LNCA for Node Replication Attack. Journal of Mobile Computing, Communications & Mobile Networks. 2017; 4(2): 41–49p.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/