Research Article Open Access

EXTENDED-RANDOMIZED, EFFICIENT, DISTRIBUTED: A DYNAMIC DETECTION OF CLONE ATTACKS IN STATIC WIRELESS SENSOR NETWORKS

C. Geetha1 and M. Ramakrishnan1
  • 1 , India
Journal of Computer Science
Volume 10 No. 10, 2014, 1900-1907

DOI: https://doi.org/10.3844/jcssp.2014.1900.1907

Submitted On: 10 February 2014 Published On: 6 May 2014

How to Cite: Geetha, C. & Ramakrishnan, M. (2014). EXTENDED-RANDOMIZED, EFFICIENT, DISTRIBUTED: A DYNAMIC DETECTION OF CLONE ATTACKS IN STATIC WIRELESS SENSOR NETWORKS. Journal of Computer Science, 10(10), 1900-1907. https://doi.org/10.3844/jcssp.2014.1900.1907

Abstract

A wireless sensor network is a collection of nodes organized in to a cooperative network. Each node consists of processing capability, multiple types of memory, a power source and actuators and sensors. This wireless sensor network is established in hostile and harsh environments like civil and military applications. This network is prone to various attacks. One of the major attack is clone attack. An adversary can capture the node and replicate the node including its cryptographic information and deploy these nodes in the network. This will lead to several problems like leaking the data, jamming the data flow, injecting false data etc. The RED protocol determined the witness node using pseudo-randomly but it is purely static. This study proposes eXtended-Randomized, Efficient, Distributed (X-RED), which detects clone nodes in the static wireless sensor networks in a dynamically fast manner. It is a distributed protocol, which computes the witness nodes dynamically. There is no pre-assumption in determining the witness node. We show that the protocol satisfies the major requirements of the distributed algorithms like the witness node is selected based on their id and location and also reduce the overhead. Simulation results show that our protocol is more efficient than other exiting protocols in terms of detection probability. This approach gives considerable amount of increase in detection probability than other existing protocols and also reduces the storage overhead. This study can be extended for mobile wireless network in the future.

  • 975 Views
  • 1,254 Downloads
  • 0 Citations

Download

Keywords

  • Attacks
  • Authentication
  • Clone Node
  • Detection Probability
  • Direction
  • Hash Function
  • Incoherent Location
  • Malicious Node
  • Storage Overhead
  • Wireless Sensor Network