An Approach to Identify Node Clones in Wireless Sensor Networks

Abstract

Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch a variety of insider attacks. This attack process is generally termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and proficient scheme, called SET, to identify such clone attacks. The key idea of SET is to identify clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes’ subset membership. SET then employs a tree structure to compute non overlapped set operations and incorporates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary.

Authors and Affiliations

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra

Keywords

Related Articles

Design of Proximity Coupled Patch Antenna for Miniaturization and Directivity Enhancement

A thorough investigation of microstrip patch antenna performance in presence of superstrate layer has been presented in this paper. Superstrate improves directivity and reduces resonant frequencies. The proximity cou...

Wireless real time health monitoring system built with FPGA and RF networks

In recent Days, heart disease is a major concern in the health indicator for the elderly. Cardiovascular diseases are always the leading cause of death in many countries. Due to the rapid growth of elderly population...

A Performance Evaluation of Different Parameter in Wireless LAN Standards using Qualnet

In recent year, wireless local area network have been developed and deployed in many wireless applications. The need for these devices is to communicate with each other effectively when the use of mobile call is incr...

The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones

The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity...

HFRECCA : A New Sentence Clustering Technique For Text Mining

Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing...

Download PDF file
  • EP ID EP27906
  • DOI -
  • Views 251
  • Downloads 0

How To Cite

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra (2014). An Approach to Identify Node Clones in Wireless Sensor Networks. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27906