CFP last date
20 December 2024
Reseach Article

Replica Node Detection in Static Wireless Sensor Networks using Neighborhood Information

by Ali Reza Khodadadi, Fereshteh Khodadadi, Mozhgan Khodadadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 5
Year of Publication: 2016
Authors: Ali Reza Khodadadi, Fereshteh Khodadadi, Mozhgan Khodadadi
10.5120/ijca2016911709

Ali Reza Khodadadi, Fereshteh Khodadadi, Mozhgan Khodadadi . Replica Node Detection in Static Wireless Sensor Networks using Neighborhood Information. International Journal of Computer Applications. 151, 5 ( Oct 2016), 11-15. DOI=10.5120/ijca2016911709

@article{ 10.5120/ijca2016911709,
author = { Ali Reza Khodadadi, Fereshteh Khodadadi, Mozhgan Khodadadi },
title = { Replica Node Detection in Static Wireless Sensor Networks using Neighborhood Information },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 5 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number5/26228-2016911709/ },
doi = { 10.5120/ijca2016911709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:17.338426+05:30
%A Ali Reza Khodadadi
%A Fereshteh Khodadadi
%A Mozhgan Khodadadi
%T Replica Node Detection in Static Wireless Sensor Networks using Neighborhood Information
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 5
%P 11-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study proposes a novel, simple, and efficient algorithm using explorer nodes to overcome the replica node attack in static wireless sensor networks. In the replica node attack, the adversary captures a legitimate node in the network and extracts its important information, including its ID, to generate and inject several replica nodes in the network. These nodes are controlled by the adversary and have the ability to link legitimate nodes. Therefore, these replica nodes can easily have their corruptive impacts on network integrity. The main notion of the proposed algorithm is to collect spatial and neighborhood information by mobile explorer nodes in the network environment to detect replica nodes. The proposed algorithm consists of two parts: 1- recording information in the buffer of explorer nodes, and 2- verifying buffer content to detect potential replica nodes. The proposed algorithm is implemented and its efficiency is evaluated by a set of experiments in terms of replica node detection rate. Furthermore, evaluation results are compared with existing algorithms and indicate that the proposed algorithm outperforms other methods.

References
  1. Akyildiz Ian F. and Kasimoglu Ismail H., "Wireless sensor and actor networks: research challenges", in: Proceedings of the Ad Hoc Networks 2, pp. 351–367, 2004.
  2. Yick J., Mukherjee B. and Ghosal D., “Wireless sensor network survey”, in: Proceedings of the Computer Networks 52, pp. 2292–2330, 2008.
  3. Karlof C. And Wagner D., “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, in: Proceedings of the Ad Hoc Networks, pp. 299-302, 2003.
  4. Walters J.P., Liang Z., Shi W. and Chaudhary V., “Wireless Sensor Network Security: A Survey”, in: proceedings of the Distributed, Grid, and Pervasive Computing, Vol. 1, Issue 2, CRC Press, pp. 1-50, 2007.
  5. Sharma K. and et al., ”A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”, in: Proceedings of the International Journal of Advanced Science and Technology, Vol. 17, April, 2010.
  6. Manjula V. and Chellappan C., “REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN”, in: Proceedings of the International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 2, March 2011.
  7. B. Parno, A. Perrig, and V. D. Gligor. “Distributed Detection of Node Replication Attacks in Sensor Networks”, IEEE Symposium on Security and Privacy, 2005.
  8. M. Conti, R. D. Pietro, and L. V. Mancini, “A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks”, In Proc. of ACM MobiHoc, September 2007.
  9. M. Conti, R. D. Pietro, L. V. Mancini, and Alessandro Mei “Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2010
  10. H. Choi, S. Zhu, and T. F. La Porta. “SET: Detecting Node Clones in Sensor Networks”, In SecureComm ’07, pages 341–350, 2007.
  11. Zhang M., Khanapure V., Chen S., Xiao X., “Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks”, in: Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2009.
  12. Deng X., Xiong Y., and Chen D., “Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks”, in: Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, 2010.
  13. Yingpei Zeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, Shanqing Guo and Li Xie,“Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5, JUNE 2010.
  14. C. Bekara and M. Laurent-Maknavicius, “A new protocol for securing wireless sensor networks against nodes replication attacks”, in WIMOB ’07: Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Washington, DC, USA: IEEE Computer Society, 2007.
  15. Thakur G., “CINORA:Cell Based Ientification of Node Replication Attack in Wireless Sensor Networks”, www.cise.ufl.edu/~gsthakur/cinora.pdf‎
  16. B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy, “Efficient Distributed Detection of Node Replication Attacks in Sensor Networks”, Annual Computer Security Applications Conference (ACSAC), December 2007.
  17. R. Blundo, A. D. Suntis, A. Herzbeg, S. Kutten, U. Vaccaro and M. Yung, ”Perfectly secure key distribution for dynamic conferences”, In Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science, vol. 17, Springer-verlag, pp. 471-486, 1992.
Index Terms

Computer Science
Information Sciences

Keywords

Static sensor networks replica node attack neighborhood information explorer node