CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Dynamic Detection of Node Replication Attack in Wireless Sensor Network using MANET

by M. Balaganesh, S. Nithyadhevi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 18
Year of Publication: 2014
Authors: M. Balaganesh, S. Nithyadhevi
10.5120/16458-5908

M. Balaganesh, S. Nithyadhevi . Dynamic Detection of Node Replication Attack in Wireless Sensor Network using MANET. International Journal of Computer Applications. 94, 18 ( May 2014), 12-16. DOI=10.5120/16458-5908

@article{ 10.5120/16458-5908,
author = { M. Balaganesh, S. Nithyadhevi },
title = { Dynamic Detection of Node Replication Attack in Wireless Sensor Network using MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 18 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number18/16458-5908/ },
doi = { 10.5120/16458-5908 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:12.082308+05:30
%A M. Balaganesh
%A S. Nithyadhevi
%T Dynamic Detection of Node Replication Attack in Wireless Sensor Network using MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 18
%P 12-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper aims to detect the cloned node in the environment network. The most conspicuous attack in Wireless Sensor Network is node replication attack. In this attack the nodes are replicated manually based on their id and key values. Cloned node or adversary promotes the node key or id of the original node, creates more replicas of the particular node in the current network with the same id and also this node may cripple the entire network. In Mobile Network the detection of replicated node is somewhat difficult and easy manner. In this paper the proposed scheme is well defined and easy manner to detect the replicas in mobile Wireless Sensor Network where the location makes the detection of replication attack even more challenging and easy thing. The proposed scheme will not only trace the location of the node, but also detect the replicas using multiple scenarios such as id recognition, frames, key values, and neighbor replica detection in dynamic manner not only for static.

References
  1. Bettstetter, C. Hartenstein, H. and Costa, X. P. (2004) "Stochastic properties of the random waypoint mobility model, " Wireless Netw. , vol. 10, no. 5, pp. 555–567.
  2. Conti, M. Pietro, R. D Mancini, L. V. and Mei, A. ( 2007) "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, Canada, pp. 80–89.
  3. Yu, C. M. Lu, C. S. And Kuok, S. Y. (2009) "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall), Anchorage, AK, USA, pp. 1–5.
  4. Hu, Y. C. Perrig, A. et. al "Packet leashes:A defense against wormhole attacks in wireless networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), pp. 1976–1986.
  5. Johnson D. B. and Maltz, D. A. (1996) "Dynamic source routing in ad hoc wireless networks," Mobile Computing. , pp. 153–181.
  6. Newsome, J. Shi, E. Song, D. and Perrig, A. (2004) "The Sybil attack in sensor networks: Analysis and defenses," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Berkeley, CA, USA, pp. 259–268.
  7. Zeng, Y. et. al "Random-walk based approach to detect clone attacks in wireless sensor networks," IEEE J. Sel. Areas Communication. , vol. 28, no. 5, pp. 677–691.
  8. Zhang, M. Khanapure, V. Chen, S. and Xiao, X. (2009) Tinyecc: A Configurable Library For Elliptic Curve Cryptography In Wireless Sensor Networks," in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, pp. 284–293.
  9. M. Balaganesh and S. Nithyadhevi "A Survey of Node Replication Attack in Wireless Sensor Network "in International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682 Vol. 18, No. 18, October 2013.
  10. Xing K. and Cheng, X. (2010) "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, pp. 1–9.
Index Terms

Computer Science
Information Sciences

Keywords

Cloning Node Sybil Attack Temper.