Review on Detection of Clone Attacks inWireless Sensor Networks
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)Publication Date: 2015-05-05
Authors : Nikita R. Kitey; M. S. Ali;
Page : 1000-1004
Keywords : Wireless sensor networks; clone; distributed detection; DHT- Distributed hash table; Randomly directed exploration;
Abstract
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been analyzed. Here we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The rst one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Our second distributed detection protocol, named randomly directed exploration. It presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination.
Other Latest Articles
- Fluidity of ADC12 Alloy Based On Theoretical and Computational Fluid Dynamics
- Constrain Control of Trigonometric Rational Quadratic Spline with Shape Parameters Based on Function Values
- Strengthening of Reinforced Concrete One-Way Slabs with Opening using CFRP Strip in Flexural
- Complete Postparturient Uterine Prolapse in HF Cross Bred Cow
- Postpartem Psychosis with Sheehans Syndrome: A Rare Case Report and a Brief Review of Literature
Last modified: 2021-06-30 21:46:31