An Approach to Identify Node Clones in Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch a variety of insider attacks. This attack process is generally termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and proficient scheme, called SET, to identify such clone attacks. The key idea of SET is to identify clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes’ subset membership. SET then employs a tree structure to compute non overlapped set operations and incorporates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary.
Authors and Affiliations
M Gowthami, Jessy Nirmal. A. G, P. S. K Patra
Delegating Auditing Task to TPA for Security in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. Extension is introducing Third Party auditing users can sa...
Detection & Prevention of Unauthorized User through Policy Server for a Network
Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require n...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
A Stochastic Representation to Probe Data Center Implementation and QoS in Iaas Cloud Organizations
Cloud computing is a general term for framework architectures that includes conveying facilitated administrations over the Internet, made conceivable by huge advancements in virtualization and circulated figuring, an...
Proficient User Revocation On Cloud Computing
In today's Computing world Cloud enlisting is one of the best advancement which uses advanced computational power and it upgrades data sharing and data securing capacities. Essential inconvenience in appropriated fig...