Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms

نویسندگان

  • Pooja Chaturvedi
  • Shyam S. Gupta
چکیده

Node replication detection is a challenging problem. Though the defending against node replication attacks demands immediate attention as compared to the extensive exploration on the defense against node replication attacks in static networks, only a few solutions in mobile networks have been presented. Additionally, whereas most of the presented schemes in static networks exist on the witnessfinding strategy that cannot be applied to mobile networks, the velocity-exceeding strategy used in existing schemes in mobile networks incurs efficiency and security problems. Thus, based on our devised challenge-and-response and encounter-number approaches, required algorithms are proposed to resist node replication attacks in mobile sensor networks. The advantages of our proposed algorithms include 1) localized detection; 2) efficiency and effectiveness; 3) network-wide synchronization avoidance; and 4) networkwide revocation avoidance. The Performance comparisons with existing methods are provided to demonstrate the efficiency of our proposed algorithms. Prototype implementation on TelosB mote demonstrates the practicality of our proposed methods. Keywords— Attack, security, wireless sensor networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In Mobile Sensor Networks Localized Algorithms for Detection of Node Replication Attacks

A wireless Sensor Network transfers the data one node to another node, energy efficient manner. The captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is a so called node replication attack. The Range Based Detection Method (RBDM) to replication attacks are proposed to resist node replication attacks in mobile sensor netwo...

متن کامل

Efficient Distributed Detection of Node Replication Attacks in Mobile Sensor Networks

Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. Detecting and monitor of the node is very difficult in distributed network and form a node replication attacks in a mobile sensor network .To detect the node replication attacks in mobile sensor networks using two localized algorithms, XED and EDD. Our proposed algorithm can resist node replication...

متن کامل

Detection of Node Replication Attacks in Mobile Sensor Networks Using Efficient Localized Detection Algorithm

Detection of node replication attacks is a challenging task in mobile sensor networks. Most of the existing system used to detect node replication using witness finding strategy which cannot be applied to mobile networks, because in mobile sensor networks nodes frequently change its location within the network or move to other network. Velocity exceeding strategy used in existing system in mobi...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014