CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Distributed Algorithm to Detecting Node Replication Attack in Mobile Wireless Sensor Networks

by Samane Mostafaei, Keramat Hasani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 152 - Number 2
Year of Publication: 2016
Authors: Samane Mostafaei, Keramat Hasani
10.5120/ijca2016911770

Samane Mostafaei, Keramat Hasani . A Distributed Algorithm to Detecting Node Replication Attack in Mobile Wireless Sensor Networks. International Journal of Computer Applications. 152, 2 ( Oct 2016), 10-15. DOI=10.5120/ijca2016911770

@article{ 10.5120/ijca2016911770,
author = { Samane Mostafaei, Keramat Hasani },
title = { A Distributed Algorithm to Detecting Node Replication Attack in Mobile Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 152 },
number = { 2 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume152/number2/26290-2016911770/ },
doi = { 10.5120/ijca2016911770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:57:03.424016+05:30
%A Samane Mostafaei
%A Keramat Hasani
%T A Distributed Algorithm to Detecting Node Replication Attack in Mobile Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 152
%N 2
%P 10-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the dangerous attacks in mobile wireless sensor networks is node replication attack. In this attack, adversary captures one of the network's legitimate nodes and extracts its important information including ID and key materials and uses this information to create duplicate (or replica nodes) and inject them to the network. In this paper, a distributed algorithm based on neighborhood information is proposed for identifying replica nodes in mobile wireless sensor networks. In the proposed algorithm, each node is responsible for handling √N other nodes (N is total number of nodes in the network). Efficiency of the proposed algorithm is evaluated in terms of detection probability, replica nodes and false detection rate. Simulation results show that after 100 traffic monitoring rounds, detection probability of replica nodes is more than 0.95 and false detection rate is less than 4%.

References
  1. Akyildiz I. F., Su W., Sankarasubramaniam Y. and Cayircl E., “A survey on sensor networks”, in: Proceedings of theIEEE Communication Magazine, Vol. 40, pp. 102-114, August 2002.
  2. Akyildiz Ian F. and Kasimoglu Ismail H.,"Wireless sensor and actornetworks: research challenges", in: Proceedings of the Ad Hoc Networks 2, pp. 351–367, 2004.
  3. Anand M., Cronin E., Sherr M. and et al, "SensorNetwork Security: More InterestingThan You Think", in: Proceedings of the USENIX Workshop on Hot Topics in Security, 2006.
  4. Parno B., Perrig A., and Gligor V. D., “Distributed Detection of NodeReplication Attacks in Sensor Networks”, IEEE Symposium on Security and Privacy, 2005.
  5. Zhu B., Addada V. G. K., Setia S., Jajodia S., and Roy S., “EfficientDistributed Detection of Node Replication Attacks in Sensor Networks”,in: Proceedings of the Annual Computer Security Applications Conference (ACSAC), December2007.
  6. Choi H., Zhu S., and Porta T. F., “SET: Detecting Node Clones inSensor Networks”, in: Proceedings of the SecureComm ’07, pages 341–350, 2007.
  7. Conti M., Pietro R. D., and Mancini L. V., “A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks”, in: Proceedings of the ACM MobiHoc, September 2007.
  8. Conti M., Pietro R. D., Mancini L. V., and Mei A., “Distributed Detection of Clone Attacksin Wireless Sensor Networks”, in: Proceedings of the IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2010.
  9. C. Bekara and M. Laurent-Maknavicius, “A new protocol for securingwireless sensor networks against nodes replication attacks”, inWIMOB ’07: Proceedings of the Third IEEE International Conferenceon Wireless and Mobile Computing, Networking and Communications.Washington, DC, USA: IEEE Computer Society, 2007, p. 59.
  10. Yu C.-M., Lu C.-S., Kuo S.-Y., “CSI: Compressed Sensing-Based Clone Identification in Sensor Networks”, in: Proceedings of the 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 2012, Lugano (19 March 2012.
  11. Ho J.-W., Wright M., and Das S., “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing”, in: Proceedings of the IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 6, JUNE 2011.
  12. Yxainaxniga Y. and et al,” Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks”, International Workshop on Information and Electronics Engineering (IWIEE), Vol.29, pp. 2798–2803, 2012.
  13. Deng X., Xiong Y., and Chen D., “Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks”,In: Proceedings of the6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2010
  14. Zhu W. T., Zhou J., Robert H. BaoD. F., “Detecting node replication attacks in mobile sensor networks: theory and approaches”, Security and Communication Networks Volume 5, pp. 496–507, 2012.
  15. ContiM., Pietro R. D. and Spognardi A.,“Wireless Sensor Replica Detection in Mobile Environments”, in: Proceedings of the ICDCN, pp. 249-264,2012.
  16. Jamshidi, M., Abbasi, S., Esnaashari, M. and Meybodi, M. R., "A Light algorithm for Detecting the Attacks of Duplicate Nodes in Mobile Wireless Sensor Networks with the aid of learning Agents", Proceedings of 23rd Iranian Conference on Electrical Enguneering, Sharif University of Technology, Tehran, Iran, May 10-14, 2015.
  17. Narendra K. S. and Thathachar M. A. L., "Learning automata: An introduction", in: Proceedings of the Prentice Hall, 1989.
  18. Narendra K. S. and Thathachar M. A. L., "Learning automata a survey", in: Proceedings of the IEEE Transactions on Systems, Man and Cybernetics, Vol. 4, no. 4, July 1974.
  19. Narendra K.S. and Viswanathan R., "Learning models using stochastic automata", in: Proceedings of the International Conference of Cybernetics and Society, Washington DC, October 1972.
Index Terms

Computer Science
Information Sciences

Keywords

Replica attack mobile wireless sensor networks neighborhood information.