Node Replication Attack Detection in Distributed Wireless Sensor Networks

نویسندگان

چکیده

Wireless sensor network (WSN) is an emerging technology used in emergency scenarios. There are a number of possible threats to WSNs because they use unsupervised IP addresses. Securing networks with unattended sensors real challenge nowadays. Sensor nodes lack power and storage, making them incompatible normal security checks. It will be vital make advancements architecture protocol design. more vulnerability attack if there security. Especially, one key node replication which induces the acts as original node, collecting data from sending it attacker. In dynamic WSN, detecting assault difficult find replica nodes. Therefore, this paper proposes Strategic Security System (SSS) discover static distributed WSNs. mainly focused on enhancing detection accuracy, time delay, communication overhead. The present system includes Single Stage Memory Random Walk Network Division (SSRWND) Random-walk-based approach detect clone attacks (RAWL). proposed has less memory better accuracy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Detection of Node Replication Attack in Wireless Sensor Network

WSNs can be deployed in harsh environments to fulfill many applications such as military, environmental, health care, remote monitoring and other applications where an attacker can physically capture some of the nodes from network. Adversary first captures all the details of node and can replicate in large number of clones taking network in control. Many distributed solutions have been proposed...

متن کامل

An Asynchronous Node Replication Attack in Wireless Sensor Networks

Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant as the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised s...

متن کامل

Trust Based Node Replication Attack Detection Protocol for Wireless Sensor Networks

The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...

متن کامل

Distributed Wormhole Attack Detection in Wireless Sensor Networks

This paper proposes a distributed wormhole detection algorithm for wireless sensor networks, a potential technology for infrastructures of many applications. Currently, most sensor networks assume they will be deployed in a benign environment; however, when a sensor network is deployed in some hostile environment, attacks (especially those like wormhole attacks that don’t need to capture the ke...

متن کامل

Distributed Denial of Service Attack Detection in Wireless Sensor Networks

Wireless sensor networks have emerged as a significant source for the study and analysis of data from the environment. These networks are deployed in harsh and inaccessible environments with the purpose of monitoring their respective surroundings, and generating observed readings, for delivery to a centralised entity, for further data analysis. Sensor nodes are tiny devices with limited availab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2022

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2022/7252791