Performance Metrics and Analysis for Node Clone Detection Schemes in Wireless Sensor Networks

Abstract

Wireless sensor networks are now-a-days rapidly developing in the field of science and technology. And it promises to have a large number of applications in next generation networks (NGN). The wireless sensor networks can be easily attacked from various sides and one of the serious attacks faced by the wireless sensor networks is the node clone attack. The node clone attack acts as the basic method to mount a huge insider attack. The cloned nodes must be detected in order to minimize the damages caused by them to the network. To protect the network from the clone attacks is to prevent an adversary from extracting the secret key materials from the captured node. Thus, various protocols were proposed to detect the cloned nodes in the network. To detect the cloned nodes from the network two existing protocols were addressed named as RM (randomized multicast) and XED (extremely efficient detection). In RM, each node broadcasts a location claim to its one-hop neighbors. Then, each neighbor selects randomly witness nodes within its communication range and forwards the location claim with a probability to the nodes closest to chosen locations by using geographic routing. At least one witness node is likely to receive conflicting location claims according to birthday paradox when replicated nodes exist in the network. The key idea of XED is to detect clones by providing the random numbers to the other nodes and asking for random number while meeting the node again. Thus, the cloned nodes will be detected by using the above mentioned protocols.

Authors and Affiliations

K. Vijayalakshmi, Dr. P. Marikkannu

Keywords

Related Articles

Implementation on Secure Distributed Deduplication Systems with Improved Reliability

Data deduplication is a method for removing multiple copies of same data, and has been widely used in cloud storage to reduce storage space and uploading speed. However, there is only one copy for each file stored in cl...

Brain Computer Interface

A BRAIN COMPUTER INTERFACE (BCI) is a direct communication pathway between the brain and an external device. The concept of BCI had coined in 1970s at the University of California Los Angeles (UCLA). Growth in neurosci...

Face Image Retrieval Techniques : A Survey

Due to popularity of digital devices, there are largely growing photos available in our life. Among them, a big percentage of are photos with human faces. Face image retrieval is an enabling technique to retrieve face i...

Path Planning in Outdoor and Unknown Environment using BAPSO Algorithm.

The path planning through BAPSO algorithm in outdoor and unknown environments is a novel approach for robotic path planning. The BAPSO is a hybrid (BAT and PSO) algorithm. The main challenges of robotics are its automat...

Reduced Effect of Vibration by Using Different Liquids in Tuned Liquid Column Damper: an Overview

An earthquake is the identifiable shaking of the surface of the earth, results in the instant release of kinetic energy in the form of seismic waves. It could be enough for the destruction of structures and thus result...

Download PDF file
  • EP ID EP20122
  • DOI -
  • Views 458
  • Downloads 19

How To Cite

K. Vijayalakshmi, Dr. P. Marikkannu (2015). Performance Metrics and Analysis for Node Clone Detection Schemes in Wireless Sensor Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20122