We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Energy Efficient Detection of Replica Node in Mobile Sensor Networks

Published on November 2012 by D. Vinoth Kannan, S. Bala Murugan
International Conference on Electronics, Communication and Information systems
Foundation of Computer Science USA
ICECI - Number 1
November 2012
Authors: D. Vinoth Kannan, S. Bala Murugan
63343c84-3404-490c-ae9d-f75d6871e479

D. Vinoth Kannan, S. Bala Murugan . Energy Efficient Detection of Replica Node in Mobile Sensor Networks. International Conference on Electronics, Communication and Information systems. ICECI, 1 (November 2012), 34-37.

@article{
author = { D. Vinoth Kannan, S. Bala Murugan },
title = { Energy Efficient Detection of Replica Node in Mobile Sensor Networks },
journal = { International Conference on Electronics, Communication and Information systems },
issue_date = { November 2012 },
volume = { ICECI },
number = { 1 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 34-37 },
numpages = 4,
url = { /specialissues/iceci/number1/9463-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Electronics, Communication and Information systems
%A D. Vinoth Kannan
%A S. Bala Murugan
%T Energy Efficient Detection of Replica Node in Mobile Sensor Networks
%J International Conference on Electronics, Communication and Information systems
%@ 0975-8887
%V ICECI
%N 1
%P 34-37
%D 2012
%I International Journal of Computer Applications
Abstract

In Mobile Sensor Network, attacker can easily capture a node and compromise that sensor node and extract keying materials from that compromised node and make replicas of them. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network . Then attacker use the replica node to inject fake data and disrupt the entire operations in the network. These Replica nodes are detected using System configure speed and neighbor identity method.

References
  1. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized,Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  2. J. Ho, M. Wright, and S. K. Das, "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis," Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
  3. J. Ho, D. Liu, M. Wright, and S. K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,"Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
  4. J. Jung, V. Paxon, A. W. Berger, and H. Balakrishnan, "Fast
  5. Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, pp. 211-225, May 2004.
  6. B. Parno, A. Perrig, and V. D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks,"
  7. . Proc. IEEE Symp. security and privacy,pp. 49-63,May 2005.
  8. K. Xing, F. Liu, X. Cheng, and H. C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
  9. C. -M. Yu, C. -S. Lu, and S. -Y. Kuo, "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks,"Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept. 2009.
  10. Engin Masazade,Ruixin Niu,Pramod K. Varshney and Mehmet Keskinoz,"Energy Aware Iterative Source Localization for Wireless Sensor Networks,"IEEE Transactions on signal Processing,vol 58,No. 9,sep 2010.
  11. Jun-Won Ho, Matthew Wright, Member, IEEE, and Sajal K. Das, Senior Member, IEEE, Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing, IEEE TRANSACTIONS on Mobile Computing, vol. 10,no. 6,June 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Node Replication Attack Mobile Sensor Node Deployment Security