Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes



This system proposes a centralized system for replica identification. The network is divided into segments and an inspection node is chosen for each segment. Inspection node identifies a clone node by checking the nodes ID and cryptographic key. In this process, Chord algorithm is used to detect the clone node, every node is assigned with random key, before it transmits the data it has to give its key which would be verified by the witness node. If same key is given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor list containing all neighbor IDs and its location. In this scheme, Energy Efficient Clustering Protocol EECP protocol is used to implement different energy saving methods.

by Dr. B. R. Tapas Bapu | Hemavathi S U | Poonkuzhali K | Sweety J “”Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes””

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020,

URL: https://www.ijtsrd.com/papers/ijtsrd31257.pdf

Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31257/network-security-enhancement-in-wsn-by-detecting-misbehavioural-activity-as-copy-cat-nodes/dr-b-r-tapas-bapu

callforpapereconomics, economicsjournal