We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

Published on August 2012 by B. Gowtham, S. Sharmila
Information Processing and Remote Computing
Foundation of Computer Science USA
IPRC - Number 1
August 2012
Authors: B. Gowtham, S. Sharmila
9ca47038-62f7-4743-967f-93fdfcc65f92

B. Gowtham, S. Sharmila . Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network. Information Processing and Remote Computing. IPRC, 1 (August 2012), 12-15.

@article{
author = { B. Gowtham, S. Sharmila },
title = { Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network },
journal = { Information Processing and Remote Computing },
issue_date = { August 2012 },
volume = { IPRC },
number = { 1 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 12-15 },
numpages = 4,
url = { /specialissues/iprc/number1/7998-1006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Information Processing and Remote Computing
%A B. Gowtham
%A S. Sharmila
%T Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network
%J Information Processing and Remote Computing
%@ 0975-8887
%V IPRC
%N 1
%P 12-15
%D 2012
%I International Journal of Computer Applications
Abstract

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key or id of the node, makes copies of the node in the network with the same id and may cripple the entire network. It is even more difficult to detect them if they are in a mobile network. The scheme proposed is for a mobile Wireless Sensor Network where the location makes the detection of replication attack even more challenging. The proposed scheme will not only trace the location using array of the locations in the mobile sensor network, but also detect the replicas using multiple scenarios such as id recognition and neighbor replica detection. The scheme can efficiently detect and make way for defense in the network.

References
  1. Distributed Detection of Node Replication Attacks in Sensor Networks, Bryan Parno, Adrian Perrig, Carnegie Mellon University; Virgil Gligor, University of Maryland.
  2. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized,Efficient, and Distributed Protocol for the Detection of NodeReplication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  3. D. Braginsky and D. Estrin. Rumor routing algorithm for sensor networks. In Proceedings of ACM Workshop on Wireless Sensor Networks and Applications, 2002.
  4. A. Hu and S. D. Servetto. Asymptotically optimal time synchronization in dense sensor networks. In Proceed- ings of ACM International Conference on Wireless Sen- sor Networks and Applications, 2003.
  5. P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet. In Proceedings of ACM Conference on Computer and Communications Security (CCS), Nov. 1999.
  6. Choi H, Zhu S, La Porta TF. "SET: Detecting node clones in sensor networks" In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007); 2007. p. 341–350
  7. Zhu B, Addada VGK, Setia S, Jajodia S, Roy S. "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks" In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007); 2007. p. 257–267
  8. Yuichi Sei , Shinichi Honiden , "Distributed Detection of Node Replication Attacks resilient to Many Compromised Nodes in Wireless Sensor Networks", 2008 ICST
  9. Chia-Mu Yu, Chun-Shien Lu and Sy-Yen Kuo, "Efficient distributed and detection of node replication attacks in mobile sensor networks" IEEE 2009.
  10. Xiaoming Deng, Yan Xiong, and DepinChen , "Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks" 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
  11. V. Manjula and Dr. C. Chellappan, "The Replication Attack in wireless Sensor Networks: Analysis & Defenses" , CCIST 2011, Communications in Computer and Information Science, Volume 132, Advances in Networks and Communications, Part II, Pages 169-178, book chapter, Springer – Verlog.
  12. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  13. B. Parno, A. Perrig, and V. D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.
  14. Jun-Won Ho, Matthew Wright and Sajal K. Das, "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing" IEEE transactions on mobile computing, vol. 10, no. 6, June 2011
  15. J. Ho, D. Liu, M. Wright, and S. K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Wireless Sensor Network Randomized Multicasting Line Selected Multicasting