Abstract

Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes’ important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead.

Highlights

  • The major focus of research has been on mobile wireless sensor networks (MWSNs), as an advantage of mobile nodes that control the movement by itself

  • Many applications for execution mobility perform an important role in a specific type of Wireless Sensor Network (WSN), which are known as MWSNs

  • In [6], a novel protocol for the recognition of clone threat elaborated. This theory is created on the concept of Polynomial-based pair-wise key pre-distribution and Bloom Filters, which explained that the clone node cannot deploy into real presence and pair wise keys of each mobile node in MWSN

Read more

Summary

Introduction

The major focus of research has been on mobile wireless sensor networks (MWSNs), as an advantage of mobile nodes that control the movement by itself. It has been noticed that mobility reduces the problems regarding maximum coverage area and connectivity. In MWSNs, the most important task is the position estimation of mobile nodes. Many applications for execution mobility perform an important role in a specific type of Wireless Sensor Network (WSN), which are known as MWSNs. Currently, MWSN has become the main focus of research as it has many issues. Recent research has shown that the features of mobility reduce many problems instead of making them complex. Mobile nodes are important and necessary modules in a wide range of applications of sensor networks [1]

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.