Open Access Open Access  Restricted Access Subscription Access

NODE BASED CLONE ATTACK DETECTION IN STATIC WIRELESS SENSOR NETWORKS


Affiliations
1 M.I.E.T Arts and Science College, India
 

   Subscribe/Renew Journal


Wireless Sensor Network (WSN) is a combination of autonomous sensor nodes and used to monitor various physical conditions. Static and mobile are two types of WSN. In static WSN the sensor nodes do not alter their positions after deployment. Due to the security constraints, WSN is vulnerable to various types of attacks. In that, Clone attack is the most dangerous attack on WSN. In Clone attack an adversary physically captures a sensor node. It reprograms the detained node and generates many clone nodes. The real nodes and clone nodes are installed in the sensor field, so clone node identification is a difficult task. The new protocol proposed to identify the clone nodes in the static WSN called as Node Based Clone Attack Detection (NBCAD) protocol. This protocol detects the clones in a efficient manner compare with SET and RED protocols. The advantage of proposed NBCAD protocol include high clone detection ratio, minimum communication overhead, minimum end-to-end delay, minimum latency time and high throughput.
Subscription Login to verify subscription
User
Notifications
Font Size

  • F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, 2002.
  • G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of ComputerScience and Information Security, Vol. 4, No. 1-2, pp. 115-119, 2009.
  • A. Daniel and K.M. Balamurugan, “A Novel Approach to Minimize Classifier Computational Overheads in Big Data using Neural Networks”, Physical Communication, Vol. 42, pp. 1-23, 2020.
  • H. Karl, A. Willig, “Protocols and Architectures for Wireless Sensor Networks”, John Wiley and Sons, 2005.
  • M. Umar, D. Babu and P. Singh, “Automation of Energy Conservation for Nodes in Wireless Sensor Networks”, International Journal of Future Generation Communication and Networking, Vol. 13, No. 3, pp. 1-12, 2020.
  • H. Choy, S. Zhu and T.F.L. Porta, “SET: Detecting Node clones in Sensor Networks”, Proceedings of International Conference on Security and Privacy in communication Networks, pp. 341-350, 2007.
  • K. Xing, F. Liu, X. Cheng and D.H.C. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks”, Proceedings of International Conference on Distributed Computing Systems, pp. 3-10, 2008.
  • B. Parno, A. Perrig and V. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks”, Proceedings of IEEE Symposium on Security and Privacy, pp. 49-63, 2005
  • M. Conti, R. Di Pietro, L.V. Mancini and A. Mei, “A Randomized and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks”, Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 80-89, 2007.
  • W. Znaidi, M. Minier, S. Ubeda, “Hierarchical Node Replication Attacks Detection in Wireless Sensors Networks”, Proceedings of IEEE International Symposium Personal, Indoor and Mobile Radio Communications, pp. 82-86, 2009.
  • Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, “Efficient Distributed Detection of Node Replication Attacks in Sensor Networks”, Proceedings of IEEE International Conference on Annual Computer Security Applications, pp. 257- 266, 2007.
  • M. Zhang, V. Khanapure, S. Chen and X. Xiao, “Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Network”, Proceedings of IEEE International Conference on Network Protocols, pp. 284- 293, 2009.
  • Y. Zeng, J. Cao, S. Zhang, S. Gao and L. Xie, “Random Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, pp. 677-689, 2010.
  • J.W. Ho, “Distributed Detection of Node Capture Attack in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Smart Wireless Sensor Networks, pp. 345-360, 2010.
  • K. Gill, S.H. Yang, F. Yao and X. Lu, “A Zig Bee-Based Home Automation System”, IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, pp. 1-13, 2009.
  • B. Mihajlov and M. Bogdanoski, “Overview and Analysis of the Performances of Zig Bee based Wireless Sensor Networks”, International Journal of Computer Applications, Vol. 29, No. 12, pp. 1-8, 2011.
  • N.A. Somani and Y. Patel, “Zig Bee: A Low Power Wireless Technology for Industrial Applications”, International Journal of Control Theory and Computer Modeling, Vol. 2, No. 3, pp. 1-14, 2012.
  • Y. Rana, V. Nandal, K. Vats and R. Kumar, “IEEE 802.15.4 based Investigation and Simulation Evaluation of Zig Bee Tree and Mesh Topology using Different QoS”, International Journal of Computer Science and Mobile Computing, Vol. 6, pp. 922-932, 2014.
  • J. Deng, Y.S. Han and P.K. Varshney, “A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks”, Proceedings of IEEE International Conference on Computer and Communications Security, pp. 42-51, 2003.
  • B.H. Wellenhoff, H. Lichtenegger and J. Collins, “Global Positions System: Theory and Practice”, 4th Edition, Springer, 1997.

Abstract Views: 353

PDF Views: 152




  • NODE BASED CLONE ATTACK DETECTION IN STATIC WIRELESS SENSOR NETWORKS

Abstract Views: 353  |  PDF Views: 152

Authors

J Anthoniraj
M.I.E.T Arts and Science College, India

Abstract


Wireless Sensor Network (WSN) is a combination of autonomous sensor nodes and used to monitor various physical conditions. Static and mobile are two types of WSN. In static WSN the sensor nodes do not alter their positions after deployment. Due to the security constraints, WSN is vulnerable to various types of attacks. In that, Clone attack is the most dangerous attack on WSN. In Clone attack an adversary physically captures a sensor node. It reprograms the detained node and generates many clone nodes. The real nodes and clone nodes are installed in the sensor field, so clone node identification is a difficult task. The new protocol proposed to identify the clone nodes in the static WSN called as Node Based Clone Attack Detection (NBCAD) protocol. This protocol detects the clones in a efficient manner compare with SET and RED protocols. The advantage of proposed NBCAD protocol include high clone detection ratio, minimum communication overhead, minimum end-to-end delay, minimum latency time and high throughput.

References