An Approach to Identify Node Clones in Wireless Sensor Networks

Abstract

Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch a variety of insider attacks. This attack process is generally termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and proficient scheme, called SET, to identify such clone attacks. The key idea of SET is to identify clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes’ subset membership. SET then employs a tree structure to compute non overlapped set operations and incorporates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary.

Authors and Affiliations

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra

Keywords

Related Articles

Design and Implementation of FPGA Radix-4 Booth Multiplication Algorithm

Fast multipliers are essential parts of digital signal processing systems.The system performance is based on the performance of multiplier used in the system, because it is the slowest component among all components...

Capabilities and Limitations of Path Gain Adjustment in Harmonic Rejection Mixers

Harmonic rejection ratios (HRR) of harmonic rejection mixers (HRM) are limited because of gain and phase inaccuracies. Gain and phase calibration can be employed to enhance HRRs. This paper deals in a systematic way...

To Resolve The Voltage Unbalance Of The Dc Links In Different H-Bridges Based Solid State Transformer (Sst)

As the expansion of the dc distribution system and the augment of the penetration of distributed generations an intelligent transformer with the capability to actively supervise the power and allowing for the easy co...

Secured Architecture To Access Cloud Based Services

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...

A System to Minimize The Storing And Managing Secret Keys Expense Using KAC

Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-si...

Download PDF file
  • EP ID EP27906
  • DOI -
  • Views 234
  • Downloads 0

How To Cite

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra (2014). An Approach to Identify Node Clones in Wireless Sensor Networks. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27906