Volume -14 | Issue -5
Volume -14 | Issue -5
Volume -14 | Issue -5
Volume -14 | Issue -5
Volume -14 | Issue -5
In densely deployed WSNs, we provide in this study an energy-efficient location-aware clone detection strategy that can ensure effective clone attack detection and preserve a reasonable network lifetime. In particular, to confirm the authenticity of sensors and report identified clone attacks, we utilize the location data of sensors and arbitrarily choose witnesses situated inside a ring area. Energy-efficient data forwarding along the path towards the witnesses and the sink is made possible by the ring structure.With reliable witnesses, we theoretically demonstrate that the suggested methodology can reach a 100% clone detection probability. By examining the clone identification performance with unreliable witnesses, we expand on the findings and demonstrate that even with 10% of witnesses compromised, the clone detection probability still reaches 98 percent. Furthermore, in the majority of current clone detection protocols that employ a random witness selection scheme, the amount of buffer storage needed for sensors is typically determined by the node density, or O(nāāā). However, in our suggested protocol, the amount of buffer storage needed for sensors is determined by the hop length of the network radius h, or O(h). Our suggested protocol can achieve a long network lifetime by efficiently dispersing the traffic load throughout the network, as shown by extensive simulations