Node Clone Detection in Wireless Sensor Networks

Similar documents
Node Clone Detection in Wireless Sensor Networks

Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN

Detection of Node Clone in Wireless Sensor Networks

EFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS

Providing High Security for WSN s Using Distributed Hash Table (DHT)

Two Novel Approaches on the Node Clone Detection in Wireless Sensor Networks

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

On the Node Clone Detection in Sensor Networks for Electronic Copy Right Management System

Key Words: Wireless Sensor network, Clones, DHT, RDE.

AN APPROACH TO DETECT NODE REPLICATION IN MOBILE SENSOR NETWORKS- SURVEY

II Year M.E Student, #2 Assistant Professor #1, #2

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Detection of Node Replication Attacks in Mobile Sensor Networks Using Efficient Localized Detection Algorithm

Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

Keywords:- Replication attack, security, wireless sensor networks, localized detection.

Securing Data Packets from Vampire Attacks in Wireless Ad-hoc Sensor Network.

Temporal Key Based Randomized Efficient and Distributed Detection of Clone Attack in WSNs

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks

Identity Replicas in WSN

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Key establishment in sensor networks

An Efficient Key Management Scheme for Heterogeneous Sensor Networks

MultiHop Routing for Delay Minimization in WSN

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Wireless Sensor Networks: Security Issues, Challenges and Solutions

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Security Issues In Mobile Ad hoc Network Routing Protocols

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Selective Forwarding Attacks Detection in WSNs

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Providing Transparent Security Services to Sensor Networks

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

WSN Routing Protocols

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

A Review on Various Routing Attacks on Wireless. Sensor Network

Key establishment in sensor networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Secure Embedded Wireless Networks

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Routing protocols in WSN

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Wireless Sensor Networks (WSN)

Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

Lecture 8 Wireless Sensor Networks: Overview

Improvement of Traffic System of Distributed Architecture in Wireless Sensor Networks by Entropy Calculation

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Fig. 2: Architecture of sensor node

Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC)

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Mesh Networking Principles

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME

A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink

Evaluation of Communication Overheads in Wireless Sensor Networks

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Code Verification Work of Sybil Attack in Wireless Sensor Network

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Sleep/Wake Aware Local Monitoring (SLAM)

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Intrusion Resilience Using Self-Healing Mechanism in Mobile Unattended WSNs Yuvapiriyaa T #1, Pradeepa R *2

Wireless Sensor Networks --- Concepts and Challenges

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

Comparative study on dynamic key-management techniques for cluster-based sensor networks

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

International Journal of Advanced Research in Computer Science and Software Engineering

Wireless Sensor Networks --- Concepts and Challenges

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Time Synchronization in Wireless Sensor Networks: CCTS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Cluster based certificate revocation For mobile ad hoc networks

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Transcription:

International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 8, November 2014, PP 23-29 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) G. Hanumantha Rao 1, K. S. Krishnakanth 2 1 PG Scholar, Eswar College of Engineering, Narasaraopet, Guntur. 2 Asst. Professor, Eswar College of Engineering, Narasaraopet, Guntur. Abstract: Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept which abbreviated as distributed hash table, by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary modification for real application, are supported by the simulations. But the DHT-based protocol incurs similar communication cost as previous techniques, it may be considered a little high for some scenarios. To overcome communication cost problem our second approach RDE/DDE distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability 1. INTRODUCTION A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, pressure, sound, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy harvesting Ability to cope with node failures Mobility of nodes Communication failures Heterogeneity of nodes Scalability to large scale of deployment Ability to withstand harsh environmental conditions Ease of use IJRSSET 23

2. LITERATURE SURVEY Distributed detection of node replication attacks in sensor networks, B. Parno, A. Perrig, and V. Gligor The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Previous node replication detection schemes depend primarily on centralized mechanisms with single points of failure, or on neighborhood voting protocols that fail to detect distributed replications. To address these fundamental limitations, we propose two new algorithms based on emergent properties (Gligor (2004)), i.e., properties that arise only through the collective action of multiple nodes. Randomized multicast distributes node location information to randomly-selected witnesses, exploiting the birthday paradox to detect replicated nodes, while line-selected multicast uses the topology of the network to detect replication. Both algorithms provide globally-aware, distributed node-replica detection, and line-selected multicast displays particularly strong performance characteristics. We show that emergent algorithms represent a promising new approach to sensor network security; moreover, our results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary. Looking up data in P2P systems: H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica,The main challenge in P2P computing is to design and implement a robust and scalable distributed system composed of inexpensive, individually unreliable computers in unrelated administrative domains. The participants in a typical P2P system might include computers at homes, schools, and businesses, and can grow to several million concurrent participants. Location-based compromise tolerant security mechanisms for wireless sensor networks: Y. Zhang,W. Liu,W. Lou, andy. Fang, Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based thresholdendorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation. 3. IMPLEMENTATION Techniques and protocol Used 1. Distributed hash table(dht) 2. Randomly directed exploration Distributed hash table (DHT) Distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes. The protocol s performance on memory consumption and a critical security metric are theoretically deducted through a probability model, and the resulting equations, with necessary adjustment for real application, are supported by the simulations. In accordance with our analysis, the comprehensive simulation results show that the DHT-based protocol can detect node clone with high security level and holds strong resistance against adversary s attacks International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 24

G. Hanumantha Rao & K. S. Krishnakanth Randomly directed exploration This is intended to provide highly efficient communication performance with adequate detection probability for dense sensor networks. In the protocol, initially nodes send claiming messages containing a neighbor-list along with a maximum hop limit to randomly selected neighbors; then, the subsequent message transmission is regulated by a probabilistic directed technique to approximately maintain a line property through the network as well as to incur sufficient randomness for better performance on communication and resilience against adversary. In addition, border determination mechanism is employed to further reduce communication payload. During forwarding, intermediate nodes explore claiming messages for node clone detection. By design, this protocol consumes almost minimal memory, and the simulations show that it outperforms all other detection protocols in terms of communication cost, while the detection probability is satisfactory Modules Setting up Network Model Initialization Process Claiming Neighbor s information Processing Claiming Message Sink Module Performance Analysis Modules Description Setting up Network Model Our first module is setting up the network model. We consider a large-scale, homogeneous sensor network consisting of resource-constrained sensor nodes. Analogous to previous distributed detection approaches; we assume that an identity-based public-key cryptography facility is available in the sensor network. Prior to deployment, each legitimate node is allocated a unique ID and a corresponding private key by a trusted third party. The public key of a node is its ID, which is the essence of an identity-based cryptosystem. Consequently, no node can lie to others about its identity. Moreover, anyone is able to verify messages signed by a node using the identity-based key.the source nodes in our problem formulation serve as storage points which cache the data gathered by other nodes and periodically transmit to the sink, in response to user queries. Such network architecture is consistent with the design of storage centric sensor networks Initialization Process To activate all nodes starting a new round of node clone detection, the initiator uses a broadcast authentication scheme to release an action message including a monotonously increasing nonce, a random round seed, and an action time. The nonce is intended to prevent adversaries from launching a DoS attack by repeating broadcasting action messages. Claiming neighbor s information Upon receiving an action message, a node verifies if the message nonce is greater than last nonce and if the message signature is valid. If both pass, the node updates the nonce and stores the seed. At the designated action time, the node operates as an observer that generates a claiming message for each neighbor (examinee) and transmits the message through the overlay network with respect to the claiming probability. Nodes can start transmitting claiming messages at the same time, but then huge traffic may cause serious interference and degrade the network capacity. To relieve this problem, we may specify a sending period, during which nodes randomly pick up a transmission time for every claiming message. Processing claiming messages A claiming message will be forwarded to its destination node via several Chord intermediate nodes. Only those nodes in the overlay network layer (i.e., the source node, Chord intermediate nodes, and the destination node) need to process a message, whereas other nodes along the path simply route the message to temporary targets. Algorithm 1 for handling a message is the kernel of our DHT-based detection protocol. If the algorithm returns NIL, then the message has arrived at its destination. Otherwise, the message will be subsequently forwarded to the next node with the ID that is returned. International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 25

Sink Module The sink is the point of contact for users of the sensor network. Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding mobile relay, which process the queries based on their data and return the query results to the sink. The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. Performance Analysis For the DHT-based detection protocol, we use the following specific measurements to evaluate its performance: Average number of transmitted messages, representing the protocol s communication cost; Average size of node cache tables, standing for the protocol s storage consumption; Average number of witnesses, serving as the protocol s security level because the detection protocol is deterministic and symmetric. 4. SYSTEM ARCHITECTURE Data Flow Diagram Wireless Sensor Networks IP Authentication No Yes Chord Network Event Starts Distributed Hash Table Randomly Directed Exploration Sink Terminate Storage ` International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 26

G. Hanumantha Rao & K. S. Krishnakanth 5. SCREEN SHOTS International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 27

6. CONCLUSION Sensor nodes lack tamper-resistant hardware and are subject to the node clone attack. In this paper, we present two distributed detection protocols: One is based on a distributed hash table, which forms a Chord overlay network and provides the key-based routing, caching, and checking facilities for clone detection, and the other uses probabilistic directed technique to achieve efficient communication overhead for satisfactory detection probability. While the DHT-based protocol provides high security level for all kinds of sensor networks by one deterministic witness and additional memory-efficient, probabilistic witnesses, the randomly directed exploration presents outstanding communication performance and minimal storage consumption for dense sensor networks. REFERENCES [1] B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, in Proc. IEEE Symp. Security Privacy, 2005, pp. 49 63. [2] H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Looking up data in P2P systems, Commun. ACM, vol. 46, no. 2, pp.43 48, 2003. [3] Y. Zhang,W. Liu,W. Lou, and Y. Fang, Location-based compromise tolerant security mechanisms for wireless sensor networks, IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 247 260, Feb. 2006. [4] S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient security mechanisms for large-scale distributed sensor networks, in Proc. 10th ACM CCS, Washington, DC, 2003, pp. 62 72. [5] R. Anderson, H. Chan, and A. Perrig, Key infection: Smart trust for smart dust, in Proc. 12th IEEE ICNP, 2004, pp. 206 215. International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 28

G. Hanumantha Rao & K. S. Krishnakanth [6] M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, A randomized,efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, in Proc. 8thACMMobiHoc,Montreal,QC, Canada, 2007, pp. 80 89. [7] B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in Proc. 23rd ACSAC, 2007, pp. 257 267. [8] H. Choi, S. Zhu, and T. F. La Porta, SET: Detecting node clones in sensor networks, in Proc. 3rd SecureComm, 2007, pp. 341 350. [9] R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijay krishnan, and M.T. Kandemir, On the detection of clones in sensor networks using random key predistribution, IEEE Trans. Syst.s, Man, Cybern. C,Appl. Rev., vol. 37, no. 6, pp. 1246 1258, Nov. 2007. [10] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, in Proc. 9th ACM Conf. Comput. Commun. Security, Washington, DC, 2002, pp. 41 47. AUTHORS BIOGRAPHY K. Hanumantha Rao is a student pursuing MTech(CSE) in Eswar college Of Engineering, Narasaraopet, Guntur. K.S.Krishna kanth M.Tech in Computer Science & Engineering. He is presently working as an Asst. Prof. in Eswar College of Engineering, Narasaraopet, Guntur, India. He is having about 9 years of teaching experience in different Engineering Colleges. International Journal of Research Studies in Science, Engineering and Technology [IJRSSET] 29