Combining the Concept of Abstraction, RAWL and Network Division to Detect Clone Node in Distributed WSN

Authors

  • M. Thirunavukkarasan  Research Scholar, Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tamil Nadu, India
  • Dr. S. A. Sahaaya Arul Mary  Professor & Head, Department of Computer Science and Engineering, Saranathan College of Engineering, Tamil Nadu, India

Keywords:

Wireless Sensor Networks, Security, Clone Node Attack, Node Replication Attack, Random Walk, Network Division, Abstraction.

Abstract

Wireless Sensor Networks (WSNs) are defenseless to clone assaults as they are conveyed in threatening and unattended environments. Likewise because of the absence of physical alter obstruction, an enemy can without much of a stretch catch and bargain sensor hubs and in the wake of imitating them, he embeds subjective number of clones into arrange. Thus the foe is capable to mount a wide assortment of interior assaults. A few arrangements have been proposed in the writing for the identification of these clones from which witness hub based circulated arrangements have indicated tasteful outcomes. Irregular Walk (RAWL) is one of the witness hub based circulated systems in which witness hubs are haphazardly chosen by starting a few irregular strolls all through the system. In spite of the fact that RAWL has accomplished high security of witness hubs however in achieving high recognition likelihood RAWL experiences high correspondence and memory overhead. In this paper I have taken three concepts abstraction which says that user cannot access any internal programming or cannot even order the node to do perform any task whereas user is allowed to select from a series of task only which will be predefined. In this case user will be node itself. Random Walk (RAWL) is one of the witness node based distributed techniques in which witness nodes are randomly selected by initiating several random walks throughout the network. Although RAWL has achieved high security of witness nodes but is not perfect. We use network division technique to divide the entire network is divided into different areas.

References

  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey", International Journal of Computer and Telecomm. Networking, 38(4): 393-422, 2002.
  2. W. Z. Khan, Y. Xiang, M. Y. Aalsalem and Q. Arshad, "Mobile Phone Sensing Systems: A Survey," IEEE Communications Surveys & Tutorials, 15(1): 402-427, 2013.
  3. C. Karlof, D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", In Proceedings of 1st IEEE international workshop on sensor network protocols and applications, May 2003.
  4. A. Wood, J. A. Stankovic, "Denial of Service in Sensor Networks,"IEEE Computer, 3(10):54-62, October 2002.
  5. S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," In Proceedings of the 10th ACM Conference On Computer and Communications Security (CCS-03), pp. 62–72, 2003.
  6. C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," ," In Proceedings of the 2nd ACM Conference Embedded Networked Sensor Systems (SenSys -04),2004, pp. 162–175.
  7. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen , D. E. Culler. "SPINS: security protocols for sensor networks.", Wireless Networks, (8): 521–34, 2002.
  8. C. Hartung, J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need for Secure Systems", Technical Report Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder, 2004.
  9. H. Choi, S. Zhu, and T. F. L. Porta, "SET: detecting node clones in sensor networks," in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm ’07),2007, pp. 341–350.
  10. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T.Kandemir, "On the Detection of Clones in Sensor Networks Using Random Key Predistribution", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 37(6): 1246-1258, 2007.
  11. B. Parno, A. Perrig and V. Gligor. "Distributed detection of node replication attacks in sensor networks", In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2005.
  12. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L.Wang, "Localizedmulticast: efficient and distributed replica detection in large-scale sensor networks," IEEE Transactions on Mobile Computing, 9(7): 913–926,2010.
  13. M. Conti, R. Di Pietro, L. Mancini, and A. Mei, "Distributed detection of clone attacks in wireless sensor networks," IEEE Transactions on Dependable and Secure Computing, 8(5): 685–698, 2011.
  14. Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random walk based approach to detect clone attacks in wireless sensor networks," IEEE Journal on Selected Areas in Communications, 28(5): 677–691, 2010.
  15. W. Z. Khan, M. Y. Aalsalem, N. M. Saad, and Y. Xiang, "Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 149023, 22 pages, 2013.
  16. W. T. Zhu, J. Zhou, R. H. Deng, and F. Bao, "Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey," Journal of Network and Computer Applications, 35(3): 1022–1034, 2012.
  17. W. Z. Khan, N. M. Saad and M. Y. Aalsalem, " Scrutinizing Well known Countermeasures against Clone Node Attack in Mobile Wireless Sensor Networks", International Journal of Grid and Utility Computing (IJGUC), 4(2): 119-127, 2013.

The Rubiks solver calculates the rotations to sove the unsolvable cube.

Downloads

Published

2018-09-30

Issue

Section

Research Articles

How to Cite

[1]
M. Thirunavukkarasan, Dr. S. A. Sahaaya Arul Mary, " Combining the Concept of Abstraction, RAWL and Network Division to Detect Clone Node in Distributed WSN, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.103-112, July-August-2018.