Abstract

The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method Randomized and Trust based witness finding strategy for replication attack detection mechanisms in wireless sensor networks (RTRADP) with trust factor. Resilient to malicious witness and increased detection rate by avoiding malicious witness selection. Performances are compared with the existing witness finding approach and how the malicious witness drops the claim without processing and how those malicious witnesses are avoided with trust based approach.

Highlights

  • A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that collaborate in order to achieve a common goal

  • The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method Randomized and Trust based witness finding strategy for replication attack detection mechanisms in wireless sensor networks (RTRADP) with trust factor

  • Performances are compared with the existing witness finding approach and how the malicious witness drops the claim without processing and how those malicious witnesses are avoided with trust based approach

Read more

Summary

Introduction

A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that collaborate in order to achieve a common goal. Sensor nodes operate in hostile environments such as battle fields and surveillance zones. Due to their operating nature, WSNs are often unattended, prone to several kinds of novel attacks. The mission-critical nature of sensor network applications implies that any compromise or loss of sensory resource due to a malicious attack launched by the adversary-class can cause significant damage to the entire network. Sensor nodes deployed in a battlefield may have intelligent adversaries operating in their surroundings, intending to subvert damage or hijack messages exchanged in the network. The compromise of a sensor node can lead to greater damage to the network. The resource challenged nature of environments of operation of sensor nodes largely differentiates them from other networks. All security solutions proposed for sensor networks need to operate with minimal energy usage, whilst securing the network

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.