An Approach to Identify Node Clones in Wireless Sensor Networks

Abstract

Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch a variety of insider attacks. This attack process is generally termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and proficient scheme, called SET, to identify such clone attacks. The key idea of SET is to identify clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes’ subset membership. SET then employs a tree structure to compute non overlapped set operations and incorporates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary.

Authors and Affiliations

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra

Keywords

Related Articles

Delegating Auditing Task to TPA for Security in Cloud Computing

This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. Extension is introducing Third Party auditing users can sa...

Detection & Prevention of Unauthorized User through Policy Server for a Network

Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require n...

Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network

Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...

A Stochastic Representation to Probe Data Center Implementation and QoS in Iaas Cloud Organizations

Cloud computing is a general term for framework architectures that includes conveying facilitated administrations over the Internet, made conceivable by huge advancements in virtualization and circulated figuring, an...

Proficient User Revocation On Cloud Computing

In today's Computing world Cloud enlisting is one of the best advancement which uses advanced computational power and it upgrades data sharing and data securing capacities. Essential inconvenience in appropriated fig...

Download PDF file
  • EP ID EP27906
  • DOI -
  • Views 244
  • Downloads 0

How To Cite

M Gowthami, Jessy Nirmal. A. G, P. S. K Patra (2014). An Approach to Identify Node Clones in Wireless Sensor Networks. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27906