Detection of Node Capture Attacks in Wireless Sensor Networks

Authors

  • K. Ravikumar  Assistant Professor, Department of Computer Science, Tamil University, Tanjavurr, Tamil Nadu, India
  • V. Manikandan  Research Scholar, Department of Computer Science, Tamil University, Tanjavurr, Tamil Nadu, India

Keywords:

Sequential Analysis, Replica Detection, Wireless Sensor Network, Event-Based Attack Decomposition

Abstract

Wireless Sensor Network is a gathering of sensors with incomplete resources that collaborate in order to achieve a shared goal. It is susceptible to node capture attacks because sensor nodes are deployed in unattended manner. Once opponent imprisonments sensor nodes, he can compromise that node and presentation various types of occurrences with those compromised nodes. The antagonist takes the secret keying possessions from a compromised node, generates a large number of attacker-controlled imitations that share the cooperated node’s keying materials and ID, and then feasts these replicas throughout the system. Therefore, captivity node attacks are perilous and should be noticed that node to reduce the harm. Several replica node detection schemes have been proposed against these attacks in static instrument networks. These methods are worked only in static sensor network and hence do not work in mobile sensor networks. In this work, propose a fast and effective mobile replication node discovery scheme using event-based attack decomposition. It shows logically and through imitation experimentations that our scheme detects mobile imitations in an efficient and robust method at the cost of judicious expenses.

References

  1. Jun-Won Ho, Mathew Wright and Sajal K.Das (2011), "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing?, IEEE Transactions on Mobile computing.
  2. J.-Y.L. Boudec and M. Vojnovi_c, "Perfect Simulation and Stationary of a Class of Mobility Models," Proc. IEEE INFOCOM,pp. 2743-2754, Mar. 2005.pp. 2743-2754, Mar. 2005.
  3. S. Capkun and J.P. Hubaux, "Secure ositioning in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. , pp. 221-232, Feb. 2006.
  4. M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  5. K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G.S.Sukhatme, "Robomote: Enabling Mobility in Sensor Networks,"Proc. Fourth IEEE Int?l Symp. Information Processing in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.
  6. J. Ho, M. Wright, and S.K. Das, "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,"Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
  7. J. Ho, D. Liu, M. Wright, and S.K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks, "Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
  8. L. Hu and D. Evans, "Localization for Mobile Sensor Networks,"Proc. ACM MobiCom, pp. 45-57, Sept. 2004.
  9. J.Jung,V. Paxon, A.W. Berger,andH.Balakrishnan,"Fast Portscan Detection Using Sequential Hypothesis Testing," Proc.IEEE Symp. Security and Privacy, pp. 211-225, May 2004.
  10. K. Xing, F. Liu, X. Cheng, and H.C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," Proc. IEEE Int?l on f. Distributed Computing Systems ICDCS), pp. 3-10, June 2008.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
K. Ravikumar, V. Manikandan, " Detection of Node Capture Attacks in Wireless Sensor Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.1301-1305, January-February-2018.