Research Article
An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model
Algorithm 1
Phase III of the proposed method FLCND.
| Algorithm: proposed clone node detection algorithm for FLCND | | Phase I and II | (1) | Begin | (2) | for each node n of the network | (3) | n = Encrypt (IDi,Li)//initialize each node with ID and Location | (4) | for each node n of the network | (5) | n[neighbor] = {idj, Lj,Timej }//each node finds its neighbor | (6) | For each node | (7) | Check the response from its neighbor | (8) | if any node does not respond | (9) | Wait for sleep time | (10) | If response does not come | (11) | Wait for Xn time | (12) | If response comes | (13) | Check the clone of | (14) | if clone present | (15) | Send information to BS and initiate the trigger revocation procedure | (16) | else | (17) | Addin the suspected list | (18) | else | (19) | Node will be dead and send information to BS and go to step 6 | (20) | else | (21) | go to step 6 | | Phase III | (22) | = total suspected nodes | (23) | = alive sensor node in the current round | (24) | for each node | (25) | Cluster head receives message from neighbor of | (26) | and calculate input parameter: , , , //analysis through fuzzy inference system (FIS) | (27) | = | (28) | If | (29) | | (30) | Advertise and initiate the trigger revocation procedure | (31) | else | (32) | go to step 24 | (33) | End |
|