Efficient Detection of Replicas and Secrecy of Data Forwarding in Wireless Sensor Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2015 by IJETT Journal
Volume-30 Number-8
Year of Publication : 2015
Authors : Gonugunta Kishore, Chintada Sunil Kumar


Gonugunta Kishore, Chintada Sunil Kumar"Efficient Detection of Replicas and Secrecy of Data Forwarding in Wireless Sensor Network", International Journal of Engineering Trends and Technology (IJETT), V30(8),415-419 December 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

The emerging Wireless Sensor Network (WSN) technology has many security issues due to its unattended nature. Node Replication Attack is a kind of application independent attack in which an adversary deploys its own inexpensive sensor nodes in the network as legitimate sensor nodes. In the existing system, using Localization Algorithm is to resist node replication attacks in mobile sensor networks. Localized algorithm includes localized detection, network-wide synchronization avoidance and network-wide revocation avoidance. Less performance comparisons with known methods are provided to demonstrate the efficiency of our proposed algorithms. In the proposed system, using fast randomized algorithm to identify the genuine node ID available in the network or not, which is verified and compared with the requested node ID to detect whether it is Replica or Genuine node ID. Here, Server maintaining each and every requested node ID’s for data transmission. Before transferring data we can encrypt and generate signature of that data using Signcryption technique. By using this technique we can perform the encryption, decryption process and also generate signature of particular data. By implementing those concepts we can improve efficiency of network and also provide more security of transferring message in a wireless sensor network.


[1]. Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mo- hammed Saad, and Yang Xiang. Detection and Mitigation of Node Repli- cation Attacks in Wireless Sensor Networks: A Survey. International Journal of Distributed Sensor Networks, 2013(2013):01 – 22, 2013.
[2] B. Gowtham and S. Sharmila. Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network. IJCA Special Issue on Information Processing and Remote Computing, IPRC(1):12 – 15, August 2012.
[3] Wen Tao Zhu, Jianying Zhou, Robert H. Deng, and Feng Bao. Detecting Node Replication Attacks inWireless Sensor Networks: A survey. Journal of Network and Computer Applications, 35(3):1022 – 1034, May 2012.
[4]. B. Parno, A. Perrig, and V. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 49-63, 2005.
[5]. C.A. Melchor, B. Ait-Salem, and P. Gaborit, “Active Detection of Node Replication Attacks,” Int?l J. Computer Science and Network Security, vol. 9, no. 2, pp. 13-21, 2009.
[6] H. Choi, S. Zhu, and T.F.L. Porta, “Set: Detecting Node Clones in Sensor Networks,” Proc. Third Int?l Conf. Security and Privacy in Comm. Networks and the Workshops (SecureComm ?07), pp. 341-350, 2007.
[7]. Z. Li and G. Gong, “DHT-Based Detection of Node Clone in Wireless Sensor Networks,” Proc. First Int?l Conf. Adhoc Networks, pp. 240-255, 2009.
[8] K. Xing, F. Liu, X. Cheng, and D.H.C. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks,” Proc. 28th Int?l Conf. Distributed Computing Systems (ICDCS ?07), pp. 3-10, 2008.
[9] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, “Random- Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks,” IEEE J. Selected Areas Comm., vol. 28, no. 5, pp. 677-691, June 2010.
[10]. K. Cho, M. Jo, T. Kwon, H.-H. Chen, and D.H. Lee, “Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks,” IEEE Systems J., vol. 7, no. 1, pp. 26- 35, Mar. 2013.
[11]. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks,” IEEE Trans. Mobile Computing, vol. 9, no. 7, pp. 913-926, July 2010
[12]. J.-W. Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks,” J. Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
[13]. J.-W. Ho, M. Wright, and S.K. Das, “Zonetrust: Fast Zone- Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 4, pp. 494- 510, July-Aug. 2012.

Security and protection, authentication, network protocols, Jamming, Signature.