Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network

Print
PDF
IJCA Special Issue on Communication Security
© 2012 by IJCA Journal
comnetcs - Number 1
Year of Publication: 2012
Authors:
Madhumathi Rajesh
Rama Sugavanam
G R Gangadevi

Madhumathi Rajesh, Rama Sugavanam and G R Gangadevi. Article: Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network. IJCA Special Issue on Communication Security comnetcs(1):1-5, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Madhumathi Rajesh and Rama Sugavanam and G R Gangadevi},
	title = {Article: Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network},
	journal = {IJCA Special Issue on Communication Security},
	year = {2012},
	volume = {comnetcs},
	number = {1},
	pages = {1-5},
	month = {March},
	note = {Full text available}
}

Abstract

The vital problem over the Wireless Sensor Networks (WSNs) are that they are often vulnerable to attacks where an adversary can easily compromise some of the nodes, can reprogram, and then, can imitate them in a large number. They distribute the clones in the network, launching node replication attacks or clone attacks by loading secret information into several replicated nodes and rejoining these nodes to execute malicious behaviors or threaten underlying protocols. Earlier works against clone attacks suffer from either a high storage or poor detection accuracy. In this paper we are proposing a new remedial, algorithm called RERD (Region based – Efficient, Randomized, and distributed) that detects the clone attack achieving a higher probability of detection. The wireless zone is partitioned into regions with the new DRCS algorithm followed by clone detection using TWG algorithm which is a combination of Token message and witness node.

References

  • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE Infocom’05, 2005.
  • F. Liu, X. Cheng, and D. Chen. Insider attacker detection in wireless sensor networks. In IEEE INFOCOM’07, Anchorage, Alaska, 2007.
  • Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap: a secure hopby-hop data aggregation protocol for sensor networks. In MobiHoc ’06, pages 356–367, 2006.
  • M. Conti, R. D. Pieto, and L. V. Mancini. “A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks”, In Proceedings of the 8th ACM International Symposium on mobile Ad Hoc Networking and Computing (MobiHoc) ,2007.
  • R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of Clones in Sensor Networks Using Random Key Predistribution,” IEEE ransSystems, Man and Cybernetics, Part C: Applications and Rev., vol. 37, no. 6, pp. 1246-1258, Nov. 2007.
  • L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Conf. Computer and Comm.Security (CCS ’02), pp. 41-47, 2002.
  • H. Choi, S. Zhu, and T. Laporta. Set: Detecting node clones in sensor networks. In SecureComm’07, 2007.
  • B. Parno, A. Perrig, and V.D. Gligor, “Distributed detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symp. Security and Privacy (S&P ’05), pp. 49-63, 2005.
  • G. Chen, J.W. Branch, and B.K. Szymanski, “Local Leader Election, Signal Strength Aware Flooding, and Routeless Routing,” Proc. IEEE Int’l Parallel and Distributed Processing Symp.(IPDPS ’05), p. 244.1, 2005.
  • Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei, “Distributed Detection of Clone Attacks in Wireless Sensor Networks” IEEE transactions on dependable and secure computing, vol. 8, no. 5, september/october 2011
  • H´enoc Soud´e, Jean M´ehat , “Energy Efficient Clustering Algorithm forWireless Sensor Networks”.