Abstract

Abstract-A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, multiple types of memory (program, data and flash memories), a RF transceiver, a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. Sensor nodes that are deployed in hostile environments are vulnerable to capture and compromise. An adversary may obtain private information from these sensors, clone and intelligently deploy them in the network to launch a variety of insider attacks. The defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory).A few distributed solutions to address this fundamental problem are not satisfactory. First, they are energy and memory demanding to be used in the WSN- resource constrained environment. Further, they are vulnerable to the certain adversary models. Hence we make the solutions of this work in threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new self-healing, distributed hash table DHT-Based Protocol for the detection of node replication attacks, and we show that it satisfies the introduced requirements. Finally, extensive simulations show that our protocol is highly efficient in communication, memory, and computation. Keywords: distributed hash table, tamper-proof, Replication attack

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call