Open Access Open Access  Restricted Access Subscription or Fee Access

Distributed Detection of Clone Attacks in Wireless Sensor Networks Using Detection Protocols

K.M. Mary Lisy, Uma Rani

Abstract


A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that collaborate in order to achieve a common goal. Sensor nodes operate in hostile environments such as battle fields and surveillance zones. Due to their operating nature, WSNs are often unattended, hence prone to several kinds of novel attacks. Sensor network attacks into three main categories: identity attacks, Routing Attacks and Network Intrusion. Identity attacks intend to steal the identities of legitimate nodes operating in the sensor network. The Identity attacks are Sybil attack and clone attack(node replication attack).A node replication attack is an attempt by the adversary to add one or more nodes to the network that use the same ID as another node in the network. This project only concentrating on an identity attack called replication attack where one or more nodes illegitimately claim an identity of legitimate node and replicated in whole WSN network.

Keywords


WSN,RED protocol,Line Selected Multicast(LSM)

Full Text:

PDF

References


C. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of 2003. IEEE Symposium on Security and Privacy (S&P’03), pages 197–213, 2003.

L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), pages 41–47, 2002.

B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In Proceedings of 2005 IEEE Symposium on Security and Privacy (S&P ’05), pages 49–63, 2005.

C. Cocks. An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA International Conference on Cryptography and Coding.

V. D. Gligor. Emergent properties in ad-hoc networks: a security perspective. In Proceedings of the 4th ACM workshop on Wireless security (WiSe ’05), page 55, 2005.pages 360–363, London, UK, 2001. Springer-Verlag.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.