ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Review on Detection of Clone Attacks inWireless Sensor Networks

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)

Publication Date:

Authors : ; ;

Page : 1000-1004

Keywords : Wireless sensor networks; clone; distributed detection; DHT- Distributed hash table; Randomly directed exploration;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been analyzed. Here we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The rst one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Our second distributed detection protocol, named randomly directed exploration. It presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination.

Last modified: 2021-06-30 21:46:31