Detection of Node Clones in Wireless Sensor Network Using Detection Protocols

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-8 Number-6                          
Year of Publication : 2014
Authors : Neenu George , T.K.Parani
  10.14445/22315381/IJETT-V8P253

Citation 

Neenu George , T.K.Parani."Detection of Node Clones in Wireless Sensor Network Using Detection Protocols", International Journal of Engineering Trends and Technology(IJETT), V8(6),286-291 February 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability.

References

[1] Zhijun Li, Member, IEEE, and Guang Gong,,“.On the Node Clone Detection in Wireless Sensor Networks”, in proc 5th IEEE transactions,Volume 40,no.11,pp 17-23,2013.
[2] H.Wen,J.Luo,L.Zhou,”Light weight and effective detection scheme for node clone attacks in wsn”, in proc IET wsn,2011.
[3] Kai Xing, X.Chen,D.H.C Du,F.Liu,”Real time detection of clone attcks in wireless sensor networks”, IEEE infocom,2008.
[4] B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security Privacy, 2005, pp. 49–63
[5] I.Stoica,R.Morris,,D.L.Nowell,D,R.Karger,M.F.Kaashoek,Hari Balakrishnan,”Chord:a scalable peer to peer look up protocol for internet applications,’IEEE/ACM Trans.Netw.,vol.11,no.1,pp,17-32,Feb.2003.
[6] Zhijun Li And Guang Gong, ”Randomly directed exploration: an efficient node clone detection protocol in wireless sensor network” ,in proc 5 th IEEE Trans.Volume 11,pp34-4..2009.
[7] C.Bekara And M.L.Maknavicius,”A new protocol for securing wsn against node replication attacks,”in third IEEE International Conference on wireless and mobile computing,networking and communications,2007,pp 59-59
[8] www.wikipedia.com

Keywords
wireless sensor networks (wsn), distributed hash table, randomly directed exploration.