Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network


Affiliations
1 Meenakshi College of Engineering, Chennai, India
     

   Subscribe/Renew Journal


The vital problem over the Wireless Sensor Networks (WSNs) are that they are often vulnerable to attacks where an adversary can easily compromise some of the nodes, can reprogram, and then, can imitate them in a large number. They distribute the clones in the network, launching node replication attacks or clone attacks by loading secret information into several replicated nodes and rejoining these nodes to execute malicious behaviors or threaten underlying protocols.  Earlier works against clone attacks suffer from either a high storage or poor detection accuracy. In this paper we are proposing a new remedial, algorithm called RERD (Region based – Efficient, Randomized, and distributed) that detects the clone attack achieving a higher probability of detection.  The wireless zone is partitioned into regions with the new DRCS algorithm followed by clone detection using TWG algorithm which is a combination of Token message and witness node.

Keywords

WSN, Clone Attack, Region, RERD, Distributed.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 213

PDF Views: 4




  • Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network

Abstract Views: 213  |  PDF Views: 4

Authors

Madhumathi Rajesh
Meenakshi College of Engineering, Chennai, India
Rama Sugavanam
Meenakshi College of Engineering, Chennai, India
G. R. Gangadevi
Meenakshi College of Engineering, Chennai, India

Abstract


The vital problem over the Wireless Sensor Networks (WSNs) are that they are often vulnerable to attacks where an adversary can easily compromise some of the nodes, can reprogram, and then, can imitate them in a large number. They distribute the clones in the network, launching node replication attacks or clone attacks by loading secret information into several replicated nodes and rejoining these nodes to execute malicious behaviors or threaten underlying protocols.  Earlier works against clone attacks suffer from either a high storage or poor detection accuracy. In this paper we are proposing a new remedial, algorithm called RERD (Region based – Efficient, Randomized, and distributed) that detects the clone attack achieving a higher probability of detection.  The wireless zone is partitioned into regions with the new DRCS algorithm followed by clone detection using TWG algorithm which is a combination of Token message and witness node.

Keywords


WSN, Clone Attack, Region, RERD, Distributed.