We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks

by S.kumaravel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 14
Year of Publication: 2012
Authors: S.kumaravel
10.5120/6331-8692

S.kumaravel . Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks. International Journal of Computer Applications. 44, 14 ( April 2012), 18-21. DOI=10.5120/6331-8692

@article{ 10.5120/6331-8692,
author = { S.kumaravel },
title = { Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 14 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number14/6331-8692/ },
doi = { 10.5120/6331-8692 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:33.257600+05:30
%A S.kumaravel
%T Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 14
%P 18-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing demand in wireless sensor network (WSN), adversary attack on sensor node becomes major issue in current WSN deployment. The replica nodes which are generated by attackers receive the valuable information from the network in turn sends to the adversaries and at the same time transmits inappropriate message to the sink in the sensor networks. One of the existing works presented Sequential Probability Ratio Test (SPRT) which reduces the overhead of sensor node transmission on the adversary conditions. However, the sensor node's mobility affected the query range being invoked for detection of replica node location with probability ratio. The energy efficiency of the sensor node also needs to be monitored for effective adversary sensor node detection using SPRT. Our proposed work extends replica detection scheme of probability ratio test with Finite Range Query (FRQ) technique to effectively identify the mobile replica nodes (acting as adversary) and eliminate the varying query ranges of mobile sensor nodes. In addition energy efficiency of the sensor nodes are improved by minimizing the message query transmission on data aggregation.

References
  1. J. Ho, M. Wright, and S. K. Das, "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing", IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 6, JUNE 2011.
  2. J. Ho, M. Wright, and S. K. Das, "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis," Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
  3. J. Ho, D. Liu, M. Wright, and S. K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
  4. L. Hu and D. Evans, "Localization for Mobile Sensor Networks," Proc. ACM MobiCom, pp. 45-57, Sept. 2004.
  5. J. Jung, V. Paxon, A. W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, pp. 211-225, May 2004.
  6. B. Parno, A. Perrig, and V. D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.
  7. H. Song, S. Zhu, and G. Cao, "Attack-Resilient Time Synchronization for Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.
  8. K. Xing, F. Liu, X. Cheng, and H. C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
  9. C. -M. Yu, C. -S. Lu, and S. -Y. Kuo, "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks," Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept. 2009.
  10. J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter. Detection of denial-of-message attacks on sensor network broadcasts. In Proceedings of IEEE Symposium on Security and Privacy, May 2005.
  11. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, "On the Detection of Clones in Sensor Networks Using Random Key Predistribution," IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, vol. 37, no. 6, pp. 1246-1258, Nov. 2007.
  12. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. " ACM MobiHoc, 2007.
  13. B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks," ACSAC, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Finite Range Query (frq) sequential Probability Ratio Test (sprt)