Open Access Open Access  Restricted Access Subscription or Fee Access

Comparing UWDBCSN Clustering with LNCA for Node Replication Attack

Harpreet Kaur, Sharad Saxena

Abstract


Abstract

Clustering in WSN divides sensor nodes into different clusters. Each node is headed by a cluster head. Instead of direct routing, the communication can take place between cluster heads that increases the lifetime of sensor network. Some security issues in clustering may arise because of the presence of attacker node(s) in the network. Attacker nodes may disrupt the whole cluster by introducing attacks like node replication, denial of service, wormhole, malicious node etc. In node replication attack, attacker may capture a sensor node, extract all the information and generate the replica inside the cluster. In this work, UWDBCSN algorithm is used for clustering in which replicas are detected using Dydog mechanism and sleep/wake scheduling algorithm is used to enhance the performance of network. We also compared our approach with LNCA node replica detection algorithm.

Keywords: UWDBCSN, sleep/wake scheduling algorithm, node replication attack, detection, Dydog algorithm

Cite this Article

Harpreet Kaur, Sharad Saxena. Comparing UWDBCSN Clustering with LNCA for Node Replication Attack. Journal of Mobile Computing, Communications & Mobile Networks. 2017; 4(2): 41–49p.



Full Text:

PDF

Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/