An Approach to Identify Node Clones in Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch a variety of insider attacks. This attack process is generally termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and proficient scheme, called SET, to identify such clone attacks. The key idea of SET is to identify clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes’ subset membership. SET then employs a tree structure to compute non overlapped set operations and incorporates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary.
Authors and Affiliations
M Gowthami, Jessy Nirmal. A. G, P. S. K Patra
Performance Analysis of Two Methods for Dimension Reduction in Face Recognition
Face recognition has been a fast growing, challenging and interesting area in real time applications. This work aims to compare the two renowned techniques of feature dimension reduction on the basis of the classific...
Implementation Of Radix-10 Matrix Code Using High Speed Adder For Error Correction
Memories are most widely used component in electronic systems. As CMOS technology scales down, multiple cell upsets (MCUs) are causing series issues in memory reliability. In order to protect data in memory, error det...
Design of the HL7 messaging RIM-based sharing components for HIS
The advancement of electronic health records(EHR) in healthcare systems ,it becomes necessary for the Healthcare organizations to use certain standards for the exchange of EHR`s of individuals among different healthc...
Modelling of Buck-Boost Converter for Photovoltaic and Battery Power Systems
In this paper a buck-boost converter with photovoltaic (PV) and battery power for high step-up system is discussed and implemented. The motive of this project is to design a MPPT(maximum power point tracking ) Algori...
Modeling A New Architecture Of Area Delay Efficient 2-D Fir Filter Using VHDL
This paper presented memory footprint and combinational complexity for two - dimensional finite impulse response (FIR) filter to get the systematic design strategy to obtain areadelay-power-efficient architectures. Ba...