Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detection and Avoidance of Node Replication Attacks in Mobile Wireless Sensor Networks


     

   Subscribe/Renew Journal


Wireless sensor nodes lack hardware support for tamper- resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and com- promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Algorithms for detecting node replication attacks. We evaluate the performance and security of our approach both theoretically and via simulation. Our results show that Localized Algorithms is more efficient than previous distributed approaches in terms of communication and memory costs. Further, Cluster is the innovation process is more accentuated. We present the cluster-based architecture to construct the topology. Nodes cooperate to form clusters, and each cluster consists of a CH along with some Cluster Members (CMs) located within the transmission range of their CH. Its help to easier transfer of information. Cluster Members asked cluster head permission for any communication. So Cluster head easily identifies Adversary because of cluster members behavior. Greater cooperation between cluster head and members. Cluster head aggregate the cluster member complaints so aggregation process reduce the energy.

Keywords

Attack, Security, Mobile Wireless Sensor Networks, Clustering Based.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 194

PDF Views: 3




  • Detection and Avoidance of Node Replication Attacks in Mobile Wireless Sensor Networks

Abstract Views: 194  |  PDF Views: 3

Authors

Abstract


Wireless sensor nodes lack hardware support for tamper- resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and com- promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Algorithms for detecting node replication attacks. We evaluate the performance and security of our approach both theoretically and via simulation. Our results show that Localized Algorithms is more efficient than previous distributed approaches in terms of communication and memory costs. Further, Cluster is the innovation process is more accentuated. We present the cluster-based architecture to construct the topology. Nodes cooperate to form clusters, and each cluster consists of a CH along with some Cluster Members (CMs) located within the transmission range of their CH. Its help to easier transfer of information. Cluster Members asked cluster head permission for any communication. So Cluster head easily identifies Adversary because of cluster members behavior. Greater cooperation between cluster head and members. Cluster head aggregate the cluster member complaints so aggregation process reduce the energy.

Keywords


Attack, Security, Mobile Wireless Sensor Networks, Clustering Based.