z-logo
open-access-imgOpen Access
Implementation of Fuzzy Based Simulation for Clone Detection in Wireless Sensor Networks
Author(s) -
Ramachandra Manjunatha,
K R Rekha,
K. R. Nataraj
Publication year - 2016
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v6i4.pp1570-1576
Subject(s) - computer science , wireless sensor network , overhead (engineering) , computer network , node (physics) , wireless , fuzzy logic , matlab , scheme (mathematics) , key distribution in wireless sensor networks , wireless network , real time computing , embedded system , operating system , engineering , mathematical analysis , mathematics , structural engineering , artificial intelligence
Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here