HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2013 | Volume: 13 | Issue: 12 | Page No.: 2264-2269
DOI: 10.3923/jas.2013.2264.2269
Research on the Detection Against Replication Attacks in Heterogeneous Wireless Sensor Networks
Xiancun Zhou, Jie Fang, Mingxi Li, Yinglai Xu and Yuhui Sun

Abstract: A number of protocols have been proposed so far to tackle node replication attacks. However, none of these schemes are suitable for wireless sensor networks with mobile nodes. Based on the collaboration mechanism of static and mobile nodes, a multi-point collaboration detection scheme against replication attacks is proposed. The scheme is consist of a polynomial based time-identity related pairwise key predistribution scheme (PTPP) which is used to defend the static network and a challenge/response based collaborative detection scheme (CCD) which is proposed for the detection of mobile replicas. A collaborative detection system is designed on GAINS3 platform. The experiment result shows that the scheme has good performances in embedability and practicality.

Fulltext PDF

How to cite this article
Xiancun Zhou, Jie Fang, Mingxi Li, Yinglai Xu and Yuhui Sun, 2013. Research on the Detection Against Replication Attacks in Heterogeneous Wireless Sensor Networks. Journal of Applied Sciences, 13: 2264-2269.

Keywords: Heterogeneous wireless sensor networks, replication attacks and multi-point collaboration mechanism

REFERENCES

  • Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. A survey on sensor networks. IEEE Commun. Mag., 40: 102-114.
    CrossRef    Direct Link    


  • Brooks, R.R., P.Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M.T. Kandemir, 2007. On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybernet. C: Appl. Rev., 37: 1246-1258.
    CrossRef    


  • Choi, H., S. Zhu and T.F. La Porta, 2007. SET: Detecting node clones in sensor networks. Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, September 17-21, 2007, Nice, France, pp: 341-350.


  • Cormen, T.H., C.E. Leiserson, R.L. Rivest and C. Stein, 2001. Introduction to Algorithms. 2nd Edn., The MIT Press, Cambridge, UK., ISBN-13: 9780262032933, Pages: 1180


  • Deng, X.M., Y. Xiong and D.P. Chen, 2010. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks. Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, October 11-13, 2010, Niagara Falls, Canada, pp: 225-232.


  • Ho, J.W., M. Wright and S. Das, 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. Proceedings of the 28th IEEE International Conference on Computer Communications, April 19-25 2009, Rio de Janeiro, Brazil, pp: 1773-1781.


  • Ko, L.C., H.Y. Chen and G.R. Lin, 2009. A neighbor-based detection scheme for wireless sensor networks against node replication attacks. Proceedings of the International Conference on Ultra Modern Telecommunications and Workshops, October 12-14, 2009, St. Petersburg, Russia, pp: 1-6.


  • Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA., USA., pp: 49-63.


  • Xing, K. and X.Z. Cheng, 2010. From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. Proceedings of the 29th IEEE International Conference on Computer Communications, March 14-19, 2010, San Diego, CA., USA., pp: 1-9.


  • Yu, C.M., C.S. Lu and S.Y. Kuo, 2008. Mobile sensor network resilient against node replication attacks. Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 16-20, 2008, San Francisco, CA., USA., pp: 597-599.


  • Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, December 10-14, 2007, Miami Beach, FL., USA., pp: 257-267.

  • © Science Alert. All Rights Reserved