Subscribe Now Subscribe Today
Research Article
 

Research on the Detection Against Replication Attacks in Heterogeneous Wireless Sensor Networks



Xiancun Zhou, Jie Fang, Mingxi Li, Yinglai Xu and Yuhui Sun
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
ABSTRACT

A number of protocols have been proposed so far to tackle node replication attacks. However, none of these schemes are suitable for wireless sensor networks with mobile nodes. Based on the collaboration mechanism of static and mobile nodes, a multi-point collaboration detection scheme against replication attacks is proposed. The scheme is consist of a polynomial based time-identity related pairwise key predistribution scheme (PTPP) which is used to defend the static network and a challenge/response based collaborative detection scheme (CCD) which is proposed for the detection of mobile replicas. A collaborative detection system is designed on GAINS3 platform. The experiment result shows that the scheme has good performances in embedability and practicality.

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
  How to cite this article:

Xiancun Zhou, Jie Fang, Mingxi Li, Yinglai Xu and Yuhui Sun, 2013. Research on the Detection Against Replication Attacks in Heterogeneous Wireless Sensor Networks. Journal of Applied Sciences, 13: 2264-2269.

DOI: 10.3923/jas.2013.2264.2269

URL: https://scialert.net/abstract/?doi=jas.2013.2264.2269
 

REFERENCES
Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. A survey on sensor networks. IEEE Commun. Mag., 40: 102-114.
CrossRef  |  Direct Link  |  

Brooks, R.R., P.Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M.T. Kandemir, 2007. On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybernet. C: Appl. Rev., 37: 1246-1258.
CrossRef  |  

Choi, H., S. Zhu and T.F. La Porta, 2007. SET: Detecting node clones in sensor networks. Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, September 17-21, 2007, Nice, France, pp: 341-350.

Cormen, T.H., C.E. Leiserson, R.L. Rivest and C. Stein, 2001. Introduction to Algorithms. 2nd Edn., The MIT Press, Cambridge, UK., ISBN-13: 9780262032933, Pages: 1180.

Deng, X.M., Y. Xiong and D.P. Chen, 2010. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks. Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, October 11-13, 2010, Niagara Falls, Canada, pp: 225-232.

Ho, J.W., M. Wright and S. Das, 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. Proceedings of the 28th IEEE International Conference on Computer Communications, April 19-25 2009, Rio de Janeiro, Brazil, pp: 1773-1781.

Ko, L.C., H.Y. Chen and G.R. Lin, 2009. A neighbor-based detection scheme for wireless sensor networks against node replication attacks. Proceedings of the International Conference on Ultra Modern Telecommunications and Workshops, October 12-14, 2009, St. Petersburg, Russia, pp: 1-6.

Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA., USA., pp: 49-63.

Xing, K. and X.Z. Cheng, 2010. From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. Proceedings of the 29th IEEE International Conference on Computer Communications, March 14-19, 2010, San Diego, CA., USA., pp: 1-9.

Yu, C.M., C.S. Lu and S.Y. Kuo, 2008. Mobile sensor network resilient against node replication attacks. Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 16-20, 2008, San Francisco, CA., USA., pp: 597-599.

Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, December 10-14, 2007, Miami Beach, FL., USA., pp: 257-267.

©  2020 Science Alert. All Rights Reserved