Open Access Open Access  Restricted Access Subscription Access

Analysis of Clone Detection Approaches in Static Wireless Sensor Networks


Affiliations
1 CSE, IKGPTU, Kapurthala, India
2 CGC, Landran, Punjab, India
3 A.P., Computer Appl. GTB, Bhawanigarh, India
 

Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.

Keywords

WSN, Clone Attack, Clone Attack Detection, Centralized Approach, Distributed Approach.
User
Notifications
Font Size

  • Yong Wang,Garhan Attebury and Byrav Ramamurthy “A survey of security networks issues in wireless sensor networks”IEEEcommunicationsSuveysandTutorials,vol.8.no.2,2006.
  • Ian F.Akyildiz, William Su, Yogis S.Subramaniam and Real Cayirci, “A survey on sensor network”, IEEE Communications Magazine, pp 102-114, August 2002.
  • Cris Townsend, Stevan Arms, “Wireless sensor network: principles and applications”, Chapter 22, pp439-449.
  • Yan-Xiao Li, Lain-Qin, Ian-Liang, “Research on wireless Sensor network security”, IEEE Computer Society, International Conference on Computational Intelligence and Security, 2010.
  • M.Conti, R.DiPietro, L.V.Mancini, A.Mei, “Requirements and open issues in distributed detection of node identity replicas in WSN” ,in SMC’06, 2006, pp.1468–1473.
  • J.W.Ho,”Distributed detection of node capture attack in wireless sensor networks”, in smart wireless sensor networks, pages 345-360, 2010
  • H.Choi, S.Zhu, T.F.LaPorta, “SET : Detecting node clones in sensor networks” , in:SecureComm’07, 2007, pp.341–350.
  • Jun-Won Ho, Dogging Lin, Matthew Wright, SajaiK.Das “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks”, Preprint submitted Elsevier, March 2009.
  • Kai Xing,Fang Liu,Xiuzhen Cheng,David H.C.Du,” Real-time Detection of clone attacks in Wireless Sensor Networks”,IEEE ICDCS 2008
  • B.Parno, A.Perrig, V.D.Gligor, “Distributed detection of node replication attacks in sensor networks” , in:S&P’05, 2005, pp.49–63.
  • Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, “Efficient Distributed Detection of Node Replication Attacks in sensor Networks”,IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
  • C. Bekara and M. Laurent- Maknavicius,”A New Protocol for securing Wireless Sensor Networks against nodes replication attacks”Third IEEE International Conference on Security and Privacy in communication networks,2008
  • Bryan Parno, Adrian Perrig, Virgil Gligor, “ Distributed Detection of Node Replication Attacks in Sensor Networks “, In proceeding of the IEEE Symposium on Security and Privacy , 2005
  • Mauro Conti, Roberto Di Pieto, L.V.Mancini and A.Mei,”A Randomized and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks “, Proc.ACM MobiHoc, Pages 80-89, Sept 2007
  • Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang “Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks”, IEEE Transactions on Mobile Computing, Vo1 9, No 7, Pages 913-926, July 2010
  • Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, “Efficient Distributed Detection of Node Replication Attacks in sensor Networks”,IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
  • Wassim Znaidi, Marine Minjer, Stephane Uheda,”Hierachical Node Replization Attacks Detection in Wireless Sensors networks “IEEE, Pages 82-86, 2009.
  • Yingpei Zeng, Jiannong Cao, Shigeng Zhang,Shanqing Gao and Li Xie “Random Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks “, IEEE Journal on selected areas in communications, vol 28, No.5 Pages 677-691, June 2010
  • Ming Zhang, Vishal Khanapure, Shigang Chen,Xuelian Xiao, “Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Network” IEEE Pages 284-293, 2009
  • Y.Lou,Y.Zhang and S,Liu,”Single hop detection of node clone attacks in mobile wireless sensor networks”, in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE)2012.

Abstract Views: 397

PDF Views: 0




  • Analysis of Clone Detection Approaches in Static Wireless Sensor Networks

Abstract Views: 397  |  PDF Views: 0

Authors

Sachin Lalar
CSE, IKGPTU, Kapurthala, India
Shashi Bhushan
CGC, Landran, Punjab, India
Surender
A.P., Computer Appl. GTB, Bhawanigarh, India

Abstract


Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.

Keywords


WSN, Clone Attack, Clone Attack Detection, Centralized Approach, Distributed Approach.

References





DOI: https://doi.org/10.13005/ojcst%2F10.03.14