Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Avoidance of Node Replication Attacks in Mobile Wireless Sensor Networks

A. Arulkumar, S. Umamaheswari

Abstract


Wireless sensor nodes lack hardware support for tamper- resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and com- promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Algorithms for detecting node replication attacks. We evaluate the performance and security of our approach both theoretically and via simulation. Our results show that Localized Algorithms is more efficient than previous distributed approaches in terms of communication and memory costs. Further, Cluster is the innovation process is more accentuated. We present the cluster-based architecture to construct the topology. Nodes cooperate to form clusters, and each cluster consists of a CH along with some Cluster Members (CMs) located within the transmission range of their CH. Its help to easier transfer of information. Cluster Members asked cluster head permission for any communication. So Cluster head easily identifies Adversary because of cluster members behavior. Greater cooperation between cluster head and members. Cluster head aggregate the cluster member complaints so aggregation process reduce the energy.

Keywords


Attack, Security, Mobile Wireless Sensor Networks, Clustering Based.

Full Text:

PDF

References


Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu and Sy-Yen Kuo, “Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks ,” Information Forensics and Security , IEEE Trans., vol. 8, no. 5, pp. 754-768, 2013.

Martin Krebs, Andr´e Stein, M´onica Alejandra Lora, ” Topology Stability-based Clustering for Wireless Mesh Networks”, Global Telecommunications Conference, 2010

M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, “Distributed detection of clone attacks in wireless sensor networks,” IEEE Trans. Depend.Secure Comput., vol. 8, no. 5, pp. 685–698, Sep./Oct. 2012.

M. Conti, R. D. Pietro, and A. Spognardi, “Wireless sensor replica detection in mobile environment,” in Proc. Int. Conf. Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012.

B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang,(2010) “Localized multicast: Efficient and distributed replica detection in large-scale sensor networks,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913–926.

M. Zhang, V. Khanapure, S. Chen, and X. Xiao,(2009) “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, pp. 284–293.

C.-M. Yu, C.-S. Lu, and S.-Y. Kuo,(2008) “Mobile sensor network resilient against node replication attacks,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, pp. 597–599.

J. Yi, J. Koo, and H. Cha,(2008) “A localization technique for mobile sensor networks using archived anchor information,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, pp. 64–72.

K. Xing and X. Cheng,(2010) “From time domain to space domain: Detecting replica attacks in mobile ad hoc networks,” in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, pp. 1–9.

B. Parno, A. Perrig, and V. Gligor,(2005) “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, pp. 49–63.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.