International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Clone Attack Detection Using Pair Access Witness Selection Technique

Author NameAuthor Details

J. Sybi Cynthia, D. Shalini Punithavathani

J. Sybi Cynthia[1]

D. Shalini Punithavathani[2]

[1]Research Scholar, C.S.I. Institute of Technology, Thovalai, Tamilnadu, India.

[2]Principal, Government College of Engineering, Tirunelveli, Tamilnadu, India.

Abstract

Sensor nodes set out in malicious surroundings and are susceptible to pickup and pact. An intruder may reach confidential hidden particulars from these sensors, clone and cleverly spread out them in the network to put up a variety of insider attacks. This attack mode is mostly defined as a clone attack. We propose a new layout for clone attack detection that comes up with successful and well-organized technique called PAWS (Pair Access Witness Selection) technique to detect such clone attacks. Selecting common nodes in between the pairmate as a witness node is the key idea of PAWS to detect clones in the network. The witness selection plays a vital role to overcome the redundancy and reachability problem. The proposed framework results in detecting clones and detection performance depends on the proper selection of witness nodes. Performance analysis and simulations also reveal that our new scheme is more proficient than extant schemes from communication cost and energy consumption.

Index Terms

Clone Attacks

Wireless Sensor Networks

Network Security

Node Replication Detection

Reference

  1. 1.
    Bharathidasan, Archana, and Vijay Anand Sai Ponduru. "Sensor networks: An overview." In IEEE INFOCOM, vol. 4. 2002.
  2. 2.
    Baykara, M., DaÅŸ, R., "A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems", International Journal of Computer Networks and Applications (IJCNA), 2(5), 203-211, 2015
  3. 3.
    Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In 2005 IEEE Symposium on Security and Privacy (S&P'05), pp. 49-63. IEEE, 2005.
  4. 4.
    Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 80-89. ACM, 2007.
  5. 5.
    Li, Zhijun, and Guang Gong. "Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 1030-1035. IEEE, 2009.
  6. 6.
    Zeng, Yingpei, Jiannong Cao, Shigeng Zhang, Shanqing Guo, and Li Xie. "Random-walk based approach to detect clone attacks in wireless sensor networks." IEEE Journal on selected areas in communications 28, no. 5: 677-691, (2010).
  7. 7.
    Melchor, Carlos Aguilar, Boussad Ait-salem, and Karim Tamine. "Active detection of node replication attacks." In International Journal of Computer Science and Network Security (IJCSNS), 9: 13–21. 2009.
  8. 8.
    Meenatchi, S., C. Navaneethan, N. Sivakumar, P. Thanapal, And J. Prabhu. "Swbc-Security In Wireless Sensor Networks By Broadcasting Location Claims." Journal of Theoretical and Applied Information Technology 64, no. 1, 2014.
  9. 9.
    Manjula, V., and C. Chellappan. "Trust based node replication attack detection protocol for wireless sensor networks." Journal of Computer Science 8, no. 11 : 1880, 2012.
  10. 10.
    Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pp. 341-350. IEEE, 2007.
  11. 11.
    Ozdemir, Suat, and Hasan Çam. "Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks."IEEE/ACM Transactions on Networking (TON) 18, no. 3: 736-749, 2010.
  12. 12.
    Li, Zhijun, and Guang Gong. "On the node clone detection in wireless sensor networks." IEEE/ACM transactions on networking 21, no. 6 : 1799-1811, 2013.
  13. 13.
    Manjula, V., and Dr C. Chellappan. "Replication attack mitigations for static and mobile WSN." arXiv preprinarXiv:1103.3378, 2011.
  14. 14.
    Vançin, Sercan, and Ebubekir Erdem. "Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard." International Journal of Computer Networks and Applications (IJCNA) 2, no. 3: 135-143, 2015.
  15. 15.
    Merlyn, A. Anuba, and A. Anuja Merlyn. "Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network."International Journal of Computer Networks and Applications 1, no. 1 : 1-10, 2014.
SCOPUS
SCImago Journal & Country Rank