A New Approach to Detect Clone Attack in WSN
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.5, No. 4)Publication Date: 2016-09-08
Authors : Swati Raimule; Anjali Chandavale;
Page : 94-99
Keywords : Keywords- Clone Attack; Security; Wireless Sensor Networks; Claimer-Reporter-Witness framework.;
Abstract
Abstract Wireless Sensor Network (WSN) has wide range of applications from defense purpose to general purpose. Because of low cost, small size and compactness of sensors, they can be deployed anywhere for important tasks. Wireless sensor networks are often deployed in the areas where they cannot be monitored easily, and they are left unattended for long time. This makes wireless sensor networks prone to different types of attacks. One of them is Clone attack. In this attack, the adversary captures and compromises legitimate node and makes the clones or replicas. Then adversary inserts those nodes inside the network. Sometimes the sensors carry confidential data with it. If these clone nodes are not quickly detected, an adversary can be further mount a variety of internal attacks. As a result, the various protocols and sensor applications get deteriorated. Several protocols have been proposed in the literature to tackle the crucial problem of clone detection, which are not satisfactory as they have some serious drawbacks. In this paper we propose a new distributed protocol called Neighbor Division Random Walk (ND-RAWL) for Clone attack detection in static WSNs. It is based on claimer-reporter-witness framework. ND-RAWL detects clone nodes with the help of a claimer-reporter-witness framework and a random walk is used within each area for the selection of witness nodes. Our simulation results show that ND-RAWL do better than the existing witness node based strategies with moderate communication overhead.
Other Latest Articles
- Experimental Studies on Concrete with Bentonite as Mineral Admixture
- WEB MULTIMEDIA CLASSIFICATION USING DT AND SVM MODELS
- RNN (Reverse Nearest Neighbor) in Unproven Reserve Based Outlier Discovery
- THE FUTURISTIC SCOPE OF MATHEMATICAL MORPHOLOGY AS WELL AS SOFT MORPHOLOGY--personnel view
- Data Analytics on Television Dataset using Hadoop for Effective Management
Last modified: 2016-09-08 19:26:19