We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Detection of False Data Distribution Nodes in Wireless Sensor Networks

by K. Sundara Velrani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 14
Year of Publication: 2013
Authors: K. Sundara Velrani
10.5120/11647-7140

K. Sundara Velrani . Detection of False Data Distribution Nodes in Wireless Sensor Networks. International Journal of Computer Applications. 68, 14 ( April 2013), 16-20. DOI=10.5120/11647-7140

@article{ 10.5120/11647-7140,
author = { K. Sundara Velrani },
title = { Detection of False Data Distribution Nodes in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 14 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number14/11647-7140/ },
doi = { 10.5120/11647-7140 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:27:49.929408+05:30
%A K. Sundara Velrani
%T Detection of False Data Distribution Nodes in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 14
%P 16-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks node compromise attack is a serious threat. Last few years many previous works has found out compromise node at the later stage. There are different stages of attacks: In first stage physically capturing and compromising nodes: Next stage compromised nodes back to the sensor networks: Last compromised sensor nodes rejoining the network and launching attack. This research work for early detection of compromised nodes in wireless sensor networks. In this work pair-based scheme to detect the node compromise attack in early stage. After sensor nodes are deployed they first build pairs in ad hoc pattern. Then the nodes within the same pairs can monitor each other to detect any node compromise attempt.

References
  1. R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler,"An analysis of a large scale habit monitoring application," in Sensys'04, 2004.
  2. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, 2002.
  3. C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: the need for secure systems," in Technical Report CU-CS-990-05, Dept. of Comp Sci. Univ of Colorado at Boulder, Jan 2005.
  4. V. C. Giruka, M. Singhal, J. Royalty and S. Varanasi," Security in wireless sensor networks", Wireless Communications and Mobile Computing, Vol. 8, No. 1, pp. 1-24, 2008.
  5. H. Song, L. Xie, S. Zhu and G. Cao, "Sensor node compromise detection: the location perspective," in IWCMC'07, Honolulu, Hawaii, USA, Aug. 2007.
  6. P. Kyasanurand H. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks," in IEEE DSN, 2003.
  7. S. Zhu, S. Setia, S. Jajodia, and P. Ning,"An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in IEEE Symposium on Security and Privacy'04, 2004.
  8. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh,"Toward resilient security in wireless sensor networks, "in ACM MobileHoc'05, 2005.
  9. F. Ye, H. Yang, and Z. Liu,"Catching moles in sensor networks," in IEEE ICDCS'07, Jun. 2007.
  10. A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van Doorn, and P. Khosla, "Pioneer: verifying integrity and guaranteeing execution of code on legacy platform," in SOSP, oct. 2005.
  11. D. Spinellis,"Reflection as a mechanism for software integrity verification," in ACM Trans. Inf. Syst. Secu. , Vol. 3, No, 1, 2000.
  12. Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed software based attestation for node compromise detection in sensor networks," in IEEE SRDS, October 2007.
  13. A. Liu and P. Ning, "TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN 2008, SPOTA Track, pp. 245-256, April 2008.
  14. H. Wang and Q. Li,"Efficient Implementation of Public Key Cryptosystems on Mote Sensors," in International Conference on Information and Communication Security (ICICS), Raleigh, NC, Dec. 4-7, 2006.
  15. D. Nacache and J. Stern,"Signing on a Postcard," in Financial Cryptography-FC 2000, LNCS 1962, pp. 121-135, Springer-Verlag, 2001.
  16. X. Du, Y. Xiao, M. Guizani, and H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Networks 2007; 5(1); 24-34.
  17. D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks", in CCS 2003, Washington D. C. , USA, Oct. 2003, pp. 52-61.
  18. Karlof, C. , Wagner, D. , 'Secure routing in wireless sensor networks: attacks and countermeasures'. Proc. First IEEE Int. Workshop on Sensor Network Protocol and Applications, 2003, pp. 113-127.
  19. Wood, A. D. , Stankovic, and J. A. ; 'A taxonomy for denial-of-service attacks in wireless sensor networks', 'Handbook of sensor networks: compact wireless and wired sensing systems; 2004.
  20. Zhang, Y. Liu, W. , Lou, W. , Fang. Y. 'Location –based compromise-tolerant security mechanisms for wireless sensor networks', IEEE J. Set Area Commun. , 2006, 24(2), pp. 247-260.
  21. Brooks,R. Govindaraju, P. Y. Pirretti,M. Vijayakrishnan, N. Kandemir,M. T:'On the detection of clones in sensor networks using random key predistribution', IEEE Trans. Syst. , Man. , Cybern. , Part C: Appl. Rev. ,2007,37(6) ,pp 1246-1258.
  22. Parno, B. , Perrig, A. Gligor, V. 'Distributed detection of node replication attacks in sensor networks'. Proc. IEEE Symp. on Security and privacy, 2005, pp. 49-63.
  23. Choi, H. zhu, S. 'La Porta TF. SET: Detecting node clones in sensor networks'. Proc. Third Int. Conf. on Security and Privacy in Communications Networks and the Workshops, 2007, pp-341-350.
  24. Kathirvel, A. and Srinivasan. R (2010) 'Self_USS: self umpiring system for security of mobile adhoc networks', International Journal of Engineering and Information Technology, Vol. 2, pp. 196-203.
  25. Behnke et. al 'Exploiting malicious node detection for life time extension for WSN', in 2009 Fourth IEEE International Symposium on Electronic Design, Test and Application.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks node compromise attack pair building