CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Use of Sequential Hypothesis Testing for Detection of Mobile Replica Nodes in Wireless Sensor Network

by Sandip D. Girase, Ashish T. Bhole
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 11
Year of Publication: 2016
Authors: Sandip D. Girase, Ashish T. Bhole
10.5120/ijca2016911624

Sandip D. Girase, Ashish T. Bhole . Use of Sequential Hypothesis Testing for Detection of Mobile Replica Nodes in Wireless Sensor Network. International Journal of Computer Applications. 149, 11 ( Sep 2016), 32-37. DOI=10.5120/ijca2016911624

@article{ 10.5120/ijca2016911624,
author = { Sandip D. Girase, Ashish T. Bhole },
title = { Use of Sequential Hypothesis Testing for Detection of Mobile Replica Nodes in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 11 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number11/26043-2016911624/ },
doi = { 10.5120/ijca2016911624 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:30.711357+05:30
%A Sandip D. Girase
%A Ashish T. Bhole
%T Use of Sequential Hypothesis Testing for Detection of Mobile Replica Nodes in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 11
%P 32-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network protection has grown to be a demanding area, previously tackled only by well qualified and familiar experts. Although more pupils become wired, an increasing number of pupils need to understand basis of security in the network world. The replica node attacks are hazardous as they allow attackers to leverage the compromise of a few nodes and exert control over much of the network. Earlier works on replica node recognition relied on set sensor locations and hence do not effort in mobile sensor network. The proposed method uses sequential probability ratio test for detection of mobile replica node. It has provided exclusive identity to the sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing results in a better detection of mobile replica nodes within wireless sensor networks. The replica node attacks are hazardous as they allow the attacker to influence the compromise of a few nodes to make use of power over a lot of the network. A number of detection schemes have been proposed for static sensor networks, fixed sensor locations and it does not effort in mobile sensor networks. An effective mobile replica node detection scheme is proposed with Sequential Probability Ratio Test (SPRT).

References
  1. R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G.Tsudik, “Data security in unattended wireless sensor networks, IEEE Transactions on Computers, vol. 58, no. 11, pp. 15001511, 2009.
  2. Haafizah Rameeza Shaukat, Fazirulhisyam Hashim, Aduwati Sali, and M. Fadlee Abdul Rasid “Node Replication Attacks in Mobile Wireless Sensor Network: A Survey”, In International Journal of Distributed Sensor Networks, Volume 2014, Article ID 402541, 15 pages.
  3. Navendu Jain, Mike Dahlin and Renu Tewari “TAPER: Tiered Approach for Eliminating Redundancy in Replica Synchronization” FAST’05:4th USENIX Conference on File and Storage Technologies.
  4. W. Znaidi, M. Minier, and S. Ubeda, “Hierarchical node replication attacks detection in wireless sensors networks,” in Proceedings of the 20th IEEE Personal, Indoor and Mobile Radio Communications Symposium (PIMRC ’09), pp. 82–86, Tokyo, Japan, September 2009.
  5. W.Zhang, G.Cao s, Optimizing tree reconfiguration for mobile target tracking in sensor networks in IEEE INFOCOM, 2004.
  6. Sandip D. Girase and Ashish T. Bhole Detection of Replica Nodes in Wireless Sensor Network: A Survey in IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 2, Vol. I (Feb-Mar. 2015).
  7. J.Jung, V.Paxon, A.W.Berger and H. Balakrishnan Fast Portscan Detection Using Sequent Hypothesis Testing Proc.IEEE, Int`l Symp.Security and Privacy, pp.211-225, May 2004.
  8. Ramesh L, Dr. A.Marimuthu “Random direction based model for Intrinsic Secrecy in Wireless Sensor Network” International Journal of Science And Research (IJSR) ISSN (Online) 2319-7064.
  9. Ashok Kumar Das “An Identity Based Random Key Pre-Distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks”International Journal of Network Security, Vol.6, PP.134-144, March 2008.
  10. Moirangthem Marjit, Ankita Singh and Jyotsna Kumar Mandal “Towards Technique of Detecting Node Replication Attacks in Static Wireless Sensor Networks” in International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2(2014), pp. 153-164.
  11. K.Xing, X. Cheng, F. Liu, and D.H.C.Du, Real-time detection of clone attacks in wireless sensor networks, in Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS 08), pp. 3-10, Beijing, China, July 2008.
  12. B.Parno, A. Per rigand V.D Gligor Distributed Detection of Node Replication attacks in Sensors Networks, in Proc. IEEE Symp. Security and Privacy, pp.49-63, May 2005.
  13. X. M. Deng and Y. Xiong, A new protocol for the detection of node replication attacks in mobile wireless sensor networks, Journal of Computer Science and Technology, vol. 26, no. 4, pp. 732-743, 2011.
  14. Balaji. N and Anitha.M, Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks, in International Journal of Research in Engineering and Technology pISSN: 2321-7308.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network (WSN) network security attack detection node replication tamper resistant hardware sequential probability ratio test (SPRT)