EXTENDED-RANDOMIZED, EFFICIENT, DISTRIBUTED: A DYNAMIC DETECTION OF CLONE ATTACKS IN STATIC WIRELESS SENSOR NETWORKS
- 1 , India
Abstract
A wireless sensor network is a collection of nodes organized in to a cooperative network. Each node consists of processing capability, multiple types of memory, a power source and actuators and sensors. This wireless sensor network is established in hostile and harsh environments like civil and military applications. This network is prone to various attacks. One of the major attack is clone attack. An adversary can capture the node and replicate the node including its cryptographic information and deploy these nodes in the network. This will lead to several problems like leaking the data, jamming the data flow, injecting false data etc. The RED protocol determined the witness node using pseudo-randomly but it is purely static. This study proposes eXtended-Randomized, Efficient, Distributed (X-RED), which detects clone nodes in the static wireless sensor networks in a dynamically fast manner. It is a distributed protocol, which computes the witness nodes dynamically. There is no pre-assumption in determining the witness node. We show that the protocol satisfies the major requirements of the distributed algorithms like the witness node is selected based on their id and location and also reduce the overhead. Simulation results show that our protocol is more efficient than other exiting protocols in terms of detection probability. This approach gives considerable amount of increase in detection probability than other existing protocols and also reduces the storage overhead. This study can be extended for mobile wireless network in the future.
DOI: https://doi.org/10.3844/jcssp.2014.1900.1907
Copyright: © 2014 C. Geetha and M. Ramakrishnan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,226 Views
- 2,225 Downloads
- 0 Citations
Download
Keywords
- Attacks
- Authentication
- Clone Node
- Detection Probability
- Direction
- Hash Function
- Incoherent Location
- Malicious Node
- Storage Overhead
- Wireless Sensor Network