A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents (original) (raw)
Related papers
Replica Node Attacks Detection in Mobile Sensor Networks Using Efficient and Distributed Scheme .
International Journal of Engineering Sciences & Research Technology, 2013
The most wireless sensor networks are composed of unshielded sensor nodes. An adversary can easily attack, analyze and clone the unshielded sensor nodes and create replicas and insert them in the networks. This gives the adversary to carry on large class of insidious attacks like disrupting communication, subverting data aggregation, eavesdropping etc… in this research we resist against node replication attacks in mobile sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. in this protocol, efficient and distributed scheme and sequential probability ratio test are used to security that the replica nodes enters in to the monitoring area containing number of nodes under consideration the path travelled by the replica nodes are monitored and other nodes present I the area are prevented from attack using the efficient and distributed scheme.
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Network security has become a challenging area, historically only tackled by well qualified and familiar experts. Although more pupils are becoming wired, an increasing number of pupils need to understand basics of security in the network world. The paper is written from the prospective of the basic computer user and information systems administrator, illuminating the concepts needed to go through the hype in the marketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allow the attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work on replica node recognition relies on set sensor locations and hence do not work in mobile sensor network. The paper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to the sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can result in a fast and effective detection of mobile replica nodes within wireless sensor network.
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing, 2013
Wireless Sensor Networks (WSNs) are often deployed in unattended environments where an adversary can easily physically capture and compromise sensor nodes. She then creates replicas of the compromised nodes instigating further attacks by spreading these replicas over the network, incurring serious damages to the network, so these replicas should be detected as early as possible. Most of the previous research efforts on detecting replica node attacks adopt static network models which are not suitable for mobile WSNs. In mobile WSN, sensor nodes are freely and randomly roaming all the time and they do not have any fixed neighbour to communicate with because these mobile nodes meet with one another occasionally and in an unpredictable manner. In this paper, we have surveyed all the existing solutions proposed so far for the detection of replica or clone nodes in mobile WSN by comparing them comprehensively and pointing out their drawbacks and shortcomings.
International Journal of Engineering Sciences & Research Technology, 2013
In wireless sensor network, there are number of small sensor nodes, this sensor nodes are organized into clusters and send some report to base station. An attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few more nodes to have control over the network. There are many node replication attack dete which have been used to secure from attacks in the sensor network where nodes are static. These methods are dependent on fixed location of sensors and hence do not works for sensor network where nodes are mobile. In this method basic idea is used that mobile node never have more speed than system speed. In this work, an optimized replica node attack detection technique in wireless sensor networks by using hypothesis testing.
Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.
Abstract: The sensor networks are often deployed in hostile environments and are not attended for long time. Deployment of these networks is increased in the recent years, as they help in monitoring and analyzing different properties of the environment. The application of wireless sensor network starts from environment, household monitoring and ranging up to critical military applications. The sensor nodes in the network are prone to different kinds of novel attacks. An attacker, with little effort, may physically capture nodes, exploits the information on the node, reprogram the node and create replicas, and secretly insert these replicas at strategic locations within the network. This is called as node replication attack. Since these replicas have legitimate access to the network (legitimate IDs, keys, other security credentials, etc.), they can participate in the network operations in the same way as a legitimate node, and thus a large variety of insider attacks takes over the network. Using such nodes the attacker can corrupt the data flowing through the network, also the attacker can disconnect some part of the network with other part of the network. Detection of node replication attack is therefore important. So, in this report we will come to know about some node replication detection schemes, out of which some depend primarily on centralized mechanisms where the base station plays very important role, and others depend on distributed detection schemes. The detection probabilities and communication overhead are the major concern while proposing and using the detection techniques. Hence, the design of efficient algorithm to detect node identity replicas is still an open and demanding issue. Keywords: Wireless sensor network, Replication attack, Centralized Detection schemes, Distributed Detection schemes, Security.
Node Replication Attack Detection in Distributed Wireless Sensor Networks
Wireless Communications and Mobile Computing
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios. There are a number of possible threats to WSNs because they use unsupervised IP addresses. Securing networks with unattended sensors is a real challenge nowadays. Sensor nodes lack power and storage, making them incompatible with normal security checks. It will be vital to make advancements in sensor network architecture and protocol design. There will be more vulnerability to attack if there is a lack of security. Especially, one key attack is node replication which induces the sensor node to acts as an original node, collecting data from the network and sending it to the attacker. In dynamic WSN, detecting an assault is difficult to find replica nodes. Therefore, this paper proposes a Strategic Security System (SSS) to discover replica nodes in static and dynamic distributed WSNs. It is mainly focused on enhancing detection accuracy, time delay, and communication overhead. The present system inclu...
Detection and mitigation of node replication attacks in wireless sensor networks: A survey
International Journal of Distributed Sensor Networks, 2013
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey
This paper presents a complete study on the detection of replication node in wireless sensor networks. Consider a very severe and important physical attack on WSN which is called node replication attack or clone attack. It is also known as identity attack. Several algorithms are developed to detect clone attacks, in static WSNs and mobile WSNs. Each one has its own advantages and disadvantages. This paper surveys these algorithms and compares their performance based on parameters like communication cost and memory.
Fast Detection of Replica Node in Mobile Sensor Network
2016
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 94 FAST DETECTION OF REPLICA NODE IN MOBILE SENSOR NETWORK Abhishek Anand1, Venu Gopal2, Nilesh Keni3 ,Nilesh Madke 1 Abhishek A,Student of B.E, Dept. of computer Engineering,ISBM SOT,University of Pune,Pune,India. 2Venu G,Student of B.E, Dept. of computer Engineering,ISBM SOT,University of Pune,Pune,India. 3 Nilesh Keni,Student of B.E, Dept. of computer Engineering,ISBM SOT,University of Pune,Pune,India 4Nilesh Madke,A.Prof of B.E, Dept. of computer Engineering,ISBM SOT,University of Pune,Pune,India. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Due to unattended nature of wireless sensor networks leads to mobile replica node attack. An adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dan...