Clone Detection on Large Scale Social Networks Including Wireless Sensor Network

Authors

  • Sumandip Kaur  Computer Science Department, G.I.M.E.T, Amritsar, Punjab, India
  • Meenakshi Sharma  Computer Science Department, G.I.M.E.T, Amritsar, Punjab, India

Keywords:

Large scale graphs analysis; graph partition and clustering; parallel processing, clone attacks, Clone detection, and security.

Abstract

Wireless sensor networks are low-cost, low-power and small sensor devices to collect information through networks. The stunning development of the internet use for all sorts of organizations has created in the meantime an expansion of Clone lent exercises, which calls for growing new strategies, devices for distinguishing Clone and different violations against reserve clients. Clone discovery needs to break down and interface data, which are assembled from heterogeneous data storehouses to address critical thinking calculations streamlining, parallelization, new learning representation of ideal models, affiliation instruments for connecting data, and diagram investigation for clustering and parceling. Authors show the inspiration of investigation and the initial steps of the work. Study will center on the development of new coding models in view of Clone attacks and WSN expansions.

References

  1. I Amerini, L. Ballan, S. Member, R. Caldelli, A. Del Bimbo, and G. Serra, “A SIFT-Based Forensic Method for Copy – Move Attack Detection and Transformation Recovery,” vol. 6, no. 3, pp. 1099–1110, 2011.
  2. Z Fei, S. H. I. Wenchang, Q. I. N. Bo, and L. Bin, “Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm,” vol. 22, no. 2, pp. 141–148, 2017.
  3. S Kiruthiga, “Detecting Cloning Attack in Social Networks Using Classification and Clustering Techniques,” IEEE, 2014.
  4. Y. Sylla and P. Morizet-mahoudeaux, “Fraud detection on large scale social networks,” no. 1, pp. 1–2.
  5. Meenakshi sharma and Dr. Himanshu Aggarwal ,Indian Journal of Science and Technology,Vol 9(34), DOI: 10.17485/ijst/2016/v9i34/100211, September 2016
  6. C Phua, V. Lee, K. Smith, and R. Gayler, “A Comprehensive Survey of Data Mining-based Fraud Detection Research.”
  7. D Sensarma and S. Sen Sarma, “A Survey on Different Graph Based Anomaly Detection Techniques,” vol. 8, no. November, 2015.
  8. G Thomas, “Cloud computing security using encryption technique,” pp. 1–7.
  9. M Conti, R. Di Pietro, L. V Mancini, and A. Mei, “Distributed Detection of Clone Attacks in Wireless Sensor Networks,” pp. 1–14, 2010.
  10. Meenakshi sharma and Dr. Himanshu Aggarwal. “Methodologies of legacy clinical decision support system -A review”, Journal of Telecommunication, Electronic and Computer Engineering(JTEC Journal) SJR and Scopus Ranking .
  11. J. Anthoniraj and T. A. Razak, “Clone Attack Detection Protocols in Wireless Sensor Networks?: A Survey,” vol. 98, no. 5, pp. 43–49, 2014.
  12. D. Dave, N. Mishra, and S. Sharma, “Detection Techniques of Clone Attack on Online Social Networks?: Survey and Analysis,” Elsevier, pp. 179–186.
  13. “Scientific Advice Mechanism Scoping Paper?: Cybersecurity,” vol. 2016, 2016.
  14. H. W. J. L. L. Zhou, “Lightweight and effective detection scheme for node clone attack in wireless sensor networks,” IEEE, no. December 2010, pp. 137–143, 2011.
  15. R. Grewal and P. G. Scholar, “A Survey on Proficient Techniques to Mitigate Clone Attack in Wireless Sensor Networks,” IEEE Access, pp. 1148–1152, 2015.
  16. M. V Barbera and A. Mei, “Personal Marks and Community Certificates?: Detecting Clones in Wireless Mobile Social Networks,” 2012.
  17. F. S. Rizi, M. R. Khayyambashi, and M. Y. Kharaji, “A New Approach for Finding Cloned Profiles in Online Social Networks,” ACEEE Int. J. Netw. Secur., vol. 6, no. April, pp. 25–37, 2014.
  18. Yang, X.-S. and He, X.S. (2013) Firefly Algorithm: Recent Advances and Applications. International Journal of Swarm Intelligence, 1, 36-50.
  19. Meenakshi sharma and Dr. Himanshu Aggarwal,”Grand Barrier In Clinical Decision Support System”, International Journal of Latest Trends in Engineering and Technology Vol.(9)Issue(2), pp.111-115 DOI: http://dx.doi.org/10.21172/1.92.19 e-ISSN:2278-621X

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Sumandip Kaur, Meenakshi Sharma, " Clone Detection on Large Scale Social Networks Including Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.114-119, May-June-2018.