CFP last date
20 December 2024
Reseach Article

Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks

by Mohammad Hasan Ansari, Vahid Tabataba Vakili
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 21
Year of Publication: 2013
Authors: Mohammad Hasan Ansari, Vahid Tabataba Vakili
10.5120/12608-9417

Mohammad Hasan Ansari, Vahid Tabataba Vakili . Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks. International Journal of Computer Applications. 71, 21 ( June 2013), 5-12. DOI=10.5120/12608-9417

@article{ 10.5120/12608-9417,
author = { Mohammad Hasan Ansari, Vahid Tabataba Vakili },
title = { Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 21 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number21/12608-9417/ },
doi = { 10.5120/12608-9417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:36:13.135307+05:30
%A Mohammad Hasan Ansari
%A Vahid Tabataba Vakili
%T Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 21
%P 5-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended protocols in this area have not been experimentalised, also no comprehensive study has been performed on the possibility and capability of these procedures; in this paper all types of sensor network architecture, with the presence of mobile sensor node, are analyzed. Then according to the type of architecture, the procedures of clone node intrusion detection is classified and meticulously scrutinized. Besides, due to measuring the efficiency, exploiting the optimum parameters and also appraising the expenses of procedures, via using OMNeT++ simulator, these procedures are analyzed by comprehensive simulation. Finally, the conclusion based on theoretical analysis and simulation is presented

References
  1. Chen et al, Sensor Network Security: A Survey. IEEE Communications Survey and Tutorials. Vol 11, No2, Second Quarter 2009
  2. W. T. Zhu et al, Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications 2012 1022-1034
  3. Michael Riecker et al, A Survey on Intrusion Detection in Wireless Sensor Networks. Technical Report, SEEMOO-TR- 2011
  4. V. Manjula et al, Replication attack mitigations for static and mobileWSN. International Journal of Network Security and Its Applications (IJNSA), Vol. 3, No. 2, March2011
  5. S. K. Das et al, A synopsis on node compromise detection in wireless sensor networks using sequential analysis. Computer Communications 34 2011 2003-2012
  6. Roberto Di Pietro et al, Securing Mobile Unattended WSNs against a Mobile Adversary. IEEE 2010
  7. Bryan Parno et al, Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE 2005
  8. Ming Zhang et al, Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. IEEE2009
  9. Ho et al, Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Transactions on Mobile Computing, Vol. 10, No. 6, June 2011
  10. J. -W. Ho et al, Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Networks 10 2012 512-523
  11. YanYxainaxniga and et al, Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks. International Workshop on Information and Electronics Engineering (IWIEE) 2012
  12. Chia-Mu Yu et al, Mobile Sensor Network Resilient against Node Replication Attacks. IEEE 2008
  13. Deng XM, Xiong Y, A new protocol for the detection of node replication attacks in mobile wireless sensor networks. Journal of Computer Science and Technology 26(4): 732- 743 July2011
  14. Xiaoming Deng et al, Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communication 2010
  15. Mauro Conti et al, Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. EURASIP Journal on Wireless Communications and Networking Volume,Article ID 9459432009
  16. Mauro Conti et al, Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. WiSec?08, March 31- April 2, Alexandria, Virginia, USA. , 2008
  17. Chia-Mu Yu et al, Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE2009
  18. Liang-Min Wang et al, Patrol Detection for Replica Attacks on Wireless Sensor Networks. Sensors 11, 2496-2504; doi:10. 3390/s1103024962011
  19. Emil Selvan et al. , Detection of Compromised Nodes in Mobile Ad-Hoc Networks. Journal of Computational Information Systems 7:62011 1823-1829
  20. J. -W. Ho et al, Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 72009 1476-1488
  21. Mauro Conti, Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing, VOL. 8, NO. 5, September/ October2011
  22. XiaoAmutihnogr et al, A Replication Detection scheme for Sensor Networks. rPinrogc 0e0d i(a2 E01n1g)i n0e0e0r?in0g0 02 9 2012 21-26
  23. Wen Tao Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme. International Conference on Network Computing and Information Security2011
  24. Chunming Rong, An Efficient Intrusion Detection Scheme for Wireless Sensor Networks. STA 2011 Workshops, CCIS 187, pp. 116-129, 2011
  25. Wang Liu, Kejie Lu et al, Performance Analysis of Wireless Sensor Networks with Mobile Sinks. IEEE Transactions on Vehichular Technology, Vol. XX, No. YY, Month2011
  26. Tamara Bonaci et al, Distributed Clone Detection in Wireless Sensor Networks: An Optimization Approach. IEEE2011
  27. bf Abu Saleh Md. Tayeen et al, Mobility Assisted Solutions for Well-known Attacks in Mobile Wireless Sensor Network. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 5, May2011
  28. Thanh Dai Tran et al, Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks. IEEE Communications Society subject matter experts for publication in the WCNC2010 proceedings
  29. Tamara Bonaci et al, Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach. IEEE2010
  30. Bin Tong et al, A three-tier framework for intruder information sharing in sensor networks. Ad Hoc Networks 82010 345-360
  31. Shigen Shen, A game-theoretic approach for optimizing intrusion detection strategy in WSNs. IEEE2011
  32. Abderrezak Rachedi, muDog: Smart Monitoring Mechanism forWireless Sensor Networks based on IEEE 802. 15. 4 MAC. IEEE International Conference on Communications ICC2011 (IEEE ICC'11), Kyoto: Japan2011
  33. Noman Mohammed et al, Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing2012
  34. Bo Zhu et al, Localized Multicast: Efficient And Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July2010
  35. Muhammad Imran et al, A Survey of Simulators, Emulators and Testbeds for Wireless Sensor Networks. IEEE2010
  36. Ansgar Kellner et al, Simulation Environments forWireless Sensor Networks. Technical Reports of the Institute of Computer Science at the Georg-August-University at Gottingen, June 2010
  37. C. Mallanda et al, Simulating Wireless Sensor Networks with OMNeT++?. LSU Simulator, Version 1,2005
  38. Xuedong Xian et al, Comparison of OMNET++ and Other Simulator for WSN Simulation. IEEE2008
  39. Klaus Wehrle et al,Modeling and Tools for Network Simulation, Springer-Verlag Berlin Heidelberg 2010
  40. Roberto Di Pietro et al, Intrusion-Resilience in Mobile Unattended WSNs. IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM2010proceedings
  41. Sooyeon Shin, An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Transactions on Industrial Informatics, Vol. 6, No. 4, November2010
  42. P. Samundiswary et al, Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks. . International Journal of Computer and Electrical Engineering, Vol. 2, No. 1, February,2010 1793-8163
  43. Mauro Conti, The Quest for Mobility Models to Analyses Security in Mobile Ad Hoc Networks. WWIC 2009, LNCS 5546, pp. 85-96,2009
  44. Marjan Kuchaki Rafsanjani et al, Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks. World Applied Sciences Journal 4 ,2008 444-449
  45. Patrick Tague et al, Modeling Node Capture Attacks in Wireless Sensor Networks. IEEE2008
  46. T. Bonaci et al, A convex optimization approach for clone detection in wireless sensor networks. Pervasive and Mobile Computing2012
  47. N. Komninos et al, Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5 2007 289-298
  48. T. C. Lam et al, A Mobile Agent Clone Detection System with Itinerary Privacy. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE?02)2002
  49. Yingpei Zeng et al, Random-Walk Based Approach to Detect Clone Attacks inWireless Sensor Networks. IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, June2010
  50. Chia-Mu Yu et al, CSI: Compressed Sensing-Based Clone Identification in Sensor Networks. 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing2012, Lugarno
  51. The IEEE 802. 15. 4 standard (ver. 2006) http://standards. ieee. org/getieee802/ download/802. 15. 4-2006. pdf
  52. A. Liu and P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. in Proc. IPSN, Apr. 2008,pp. 245?256.
  53. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks. in Proc. IEEE Int. Conf. Pervasive Comput. Commun. , Mar. 2005, pp. 324-328.
  54. P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller,and M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes. in Proc. 2nd ACM Int. Conf. Wirel. SensorNetw. Applicat. ,2003, pp. 151-159.
Index Terms

Computer Science
Information Sciences

Keywords

wireless sensor network (WSN) clone attack intrusion detection mobility