Author:
M Sajitha, ,Kavitha D,Reddy P Chenna, ,
Abstract
In unattended areas, the wireless sensor network is deployed and the nodes are always open to attacks. An adversary can capture a node and can deploy many nodes, which are clone of the captured, in the network called clone node or replicated node by using the credential information retrieved from captured node. These clone nodes can damage the network directly or indirectly. This attack is called node replication o attack or clone node attack. In this area, so many works are introduced and all of these methods use a random key or code, or location information, to detect clone nodes. This paper presents a method that does not use any of this information. The simulation results show that it performs better than previous methods.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Management of Technology and Innovation,General Engineering
Reference25 articles.
1. I.F. Akyildiz, et al., " A Survey on Sensor Networks," in IEEE Commun, Mag., vol. 40, no. 8, , pp.102-114, Aug, 2002. [CrossRef]
2. J. Deng, et al., "A Survey on Sensor Networks," in security, privacy, and fault tolerance in wireless sensor networks. Artech House, August 2005.
3. T. Bonaci, et al., " Distributed clone detection in wireless sensor networks: an optimization approach," in Proceedings of the 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks (WoWMoM '11), Lucca, Italy,, June 2011. [CrossRef]
4. W. T. Zhu et al., "Detecting node replication attacks in wireless sensor networks: a survey, " in : a survey, Journal of Network and Computer Applications,, vol. 35, no. 3, pp. 1022-1034, 2012. [CrossRef]
5. B. Parno, et al., "Distributed detection of node replication attacks in sensor networks, " in In Security and Privacy, 2005 IEEE Symposium. pages 49 -63, may 2005.