Abstract

Problem statement: Wireless mobile sensor networks are deploying large, self-organized and adaptable sets of sensors for many applications such as military, environmental, health care, remote monitoring and other applications. Unfortuna tely, the simplicity and low-cost of these sensors make eases cloning of compromised nodes by attackers in the network. Due to the unattended nature of wireless sensor networks, an adversary can captu re and compromise sensor nodes, make replicas of them and then mount a variety of attacks with these clones. This cloning attack is the entry point for a large span of creepy attacks. In such attack, an ad versary uses the credentials of a compromised node to introduce the replicas secretly into the network . These replicas are then used to launch a variety of attacks that challenge the sensor applications. The refore the detection of node replication or called clone attacks in a wireless sensor network is a fun damental problem. Approach : These clone node attacks are highly dangerous because they allow the attacker to compromise a few nodes to exert control over much of the network. Several clone nod e detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory in Pro-active context. First, they are energy and memory demandi ng: A serious drawback for any protocol to be used in the WSN-resource-con strained environment. Further, they are vulnerable to the specific adversary models introduced in this study. To overcome the above problems we propose the improved version of Randomized, Efficient and Distributed protocol named SRED-Secure, Randomized and Efficient and Distributed protocol. We show that our emergent algorithms represent a promising new approach to sensor network security b y improving its trust aspects with the witness node. Results: The result of the experiments shows that not only t he improvement levels of security aspects but also shows that the considerable amount of improvements in memory and time overheads. Conclusion: This method improves the security aspect of wireles s sensor networks mainly in unattended environment and improves the real time data acquisition systems in future era.

Highlights

  • Capture and compromise sensor nodes and use them to inject counterfeit data into the network

  • The replica nodes are controlled by the adversary, but have keying materials that allow them to seem like authorized participants in the network

  • There are many replica node detection schemes have been proposed for static sensor networks (Parno et al, 2005), (Conti et al, 2007), (Xing et al, 2008)

Read more

Summary

Introduction

Capture and compromise sensor nodes and use them to inject counterfeit data into the network,. Current generations of sensor nodes lack hardware protection for tampercommunications. In this scenario, a dodgy attack is the clone node attack (Parno et al, 2005), in which the adversary takes the secret keying materials from a compromised node, generates a large number of resistance, but are often deployed in unattended and attacker controlled replicas that share the compromised harsh environments and are susceptible to capture node’s keying materials and ID and spreads these and compromise. In potentially antagonistic replicas throughout the network. The attacker may be able to replica nodes in the network.

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.