Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

Print
PDF
IJCA Special Issue on Information Processing and Remote Computing
© 2012 by IJCA Journal
IPRC - Number 1
Year of Publication: 2012
Authors:
B. Gowtham
S. Sharmila

B Gowtham and S Sharmila. Article: Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network. IJCA Special Issue on Information Processing and Remote Computing IPRC(1):12-15, August 2012. Full text available. BibTeX

@article{key:article,
	author = {B. Gowtham and S. Sharmila},
	title = {Article: Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network},
	journal = {IJCA Special Issue on Information Processing and Remote Computing},
	year = {2012},
	volume = {IPRC},
	number = {1},
	pages = {12-15},
	month = {August},
	note = {Full text available}
}

Abstract

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key or id of the node, makes copies of the node in the network with the same id and may cripple the entire network. It is even more difficult to detect them if they are in a mobile network. The scheme proposed is for a mobile Wireless Sensor Network where the location makes the detection of replication attack even more challenging. The proposed scheme will not only trace the location using array of the locations in the mobile sensor network, but also detect the replicas using multiple scenarios such as id recognition and neighbor replica detection. The scheme can efficiently detect and make way for defense in the network.

References

  • Distributed Detection of Node Replication Attacks in Sensor Networks, Bryan Parno, Adrian Perrig, Carnegie Mellon University; Virgil Gligor, University of Maryland.
  • M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized,Efficient, and Distributed Protocol for the Detection of NodeReplication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  • D. Braginsky and D. Estrin. Rumor routing algorithm for sensor networks. In Proceedings of ACM Workshop on Wireless Sensor Networks and Applications, 2002.
  • A. Hu and S. D. Servetto. Asymptotically optimal time synchronization in dense sensor networks. In Proceed- ings of ACM International Conference on Wireless Sen- sor Networks and Applications, 2003.
  • P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet. In Proceedings of ACM Conference on Computer and Communications Security (CCS), Nov. 1999.
  • Choi H, Zhu S, La Porta TF. "SET: Detecting node clones in sensor networks" In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007); 2007. p. 341–350
  • Zhu B, Addada VGK, Setia S, Jajodia S, Roy S. "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks" In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007); 2007. p. 257–267
  • Yuichi Sei , Shinichi Honiden , "Distributed Detection of Node Replication Attacks resilient to Many Compromised Nodes in Wireless Sensor Networks", 2008 ICST
  • Chia-Mu Yu, Chun-Shien Lu and Sy-Yen Kuo, "Efficient distributed and detection of node replication attacks in mobile sensor networks" IEEE 2009.
  • Xiaoming Deng, Yan Xiong, and DepinChen , "Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks" 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
  • V. Manjula and Dr. C. Chellappan, "The Replication Attack in wireless Sensor Networks: Analysis & Defenses" , CCIST 2011, Communications in Computer and Information Science, Volume 132, Advances in Networks and Communications, Part II, Pages 169-178, book chapter, Springer – Verlog.
  • M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  • B. Parno, A. Perrig, and V. D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.
  • Jun-Won Ho, Matthew Wright and Sajal K. Das, "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing" IEEE transactions on mobile computing, vol. 10, no. 6, June 2011
  • J. Ho, D. Liu, M. Wright, and S. K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.