63 research outputs found

    Node-Replication Attack Detection in Vehicular Ad-hoc Networks based on Automatic Approach

    Get PDF
    Recent advances in smart cities applications enforce security threads such as node replication attacks. Such attack is take place when the attacker plants a replicated network node within the network. Vehicular Ad hoc networks are connecting sensors that have limited resources and required the response time to be as low as possible. In this type networks, traditional detection algorithms of node replication attacks are not efficient. In this paper, we propose an initial idea to apply a newly adapted statistical methodology that can detect node replication attacks with high performance as compared to state-of-the-art techniques. We provide a sufficient description of this methodology and a road-map for testing and experiment its performance

    Kriptografi Dan Skema Keamanan Untuk Jaringan Sensor Nirkawat

    Full text link
    This paper attempts to explore the security issues in sensor network that include constraints in sensor networks security, the requirements of secure sensor networks, attack classification and its counter measures and security mechanisms at wirelesssensor network (WSN) such as cryptography and key management. Popularity of wireless sensor network is increasing because of its potential to provide low-cost solution for a variety of real-world problem. As a special form of ad-hoc networks, sensor networks has many limitations that lead to vulnerabilities in security issues. Currently, there are many researches in the field of sensor network security. Our analysis shows that symmetric key cryptography systems are more favorable to provide WSN security services because of its computation and energy cost. Moreover, distributed combine with pre-distributed key management is important to overcome security threats and centralize threats detection is more favorable to reduce energy and computation cost of sensor nodes

    Replication Attack Mitigations for Static and Mobile WSN

    Full text link
    Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.Comment: 12 page

    A New Approach for Node Replica Detection in WSN

    Get PDF
    Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone. To identify Node clone proposingĀ  distributed hash tableĀ  which a fully decentralized, key-based caching and checking system .next introducingĀ  distributed detection protocol providesĀ  good communication performance for largeĀ  sensor networks. sensor-MAC a new MAC protocol explicitly designed for wireless sensor networks for reducing energy consumption. Our protocol also has good scalability and collision avoidance capabilit

    Implementation of Fuzzy Based Simulation for Clone Detection in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms

    Clone Detection for Efficient System in WSN using AODV

    Get PDF
    Wireless sensor is wide deployed for a spread of application, starting from surroundings observance to telemedicine and objects chase, etc. For value effective sensing element placement, sensors are usually not tamperproof device and are deployed in places while not observance and protection, that creates them at risk of fully different attacks. As an example, a malicious user may compromise some sensors and acquire their private information. Then, it?ll duplicate the detectors and deploy clones in an exceedingly wireless sensor network (WSN) to launch a spread of attack that?s mentioned as clone attack. Because the duplicated sensors have an equivalent information, e.g., code and crypto graphical information, captured from legitimate sensors that may merely participate in network operation and launch attacks. Because of the low value for sensing components duplication and preparation, clone attacks became one in all the foremost essential security issues in WSNs. Thus, it?s essential to effectively detect clone attacks therefore to ensure healthy operation of WSNs

    Patrol Detection for Replica Attacks on Wireless Sensor Networks

    Get PDF
    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods

    Replication Attack Detection in Mobile Wireless Sensor Network with LEACH-ME Routing Protocol

    Get PDF
    Because the Wireless Sensor Network (WSN) nodes are low-cost devices, attackers may capture some nodes in this network and then duplicate these nodes to eavesdrop the transmitted messages or even control the network gradually without difficulty. This is the so-called node replication attack. This type of attacks could cause the huge threat to information security of WSNs. Therefore, in this paper, we would like to suggest a detection approach which can offer good performance but with higher energy consumption. Hence, it can provide an alternative solution for some specific applications that need better precision but do not care energy or lifespan too much
    • ā€¦
    corecore