AN APPROACH TO DETECT NODE REPLICATION IN MOBILE SENSOR NETWORKS- SURVEY

Similar documents
Detection of Node Replication Attacks in Mobile Sensor Networks Using Efficient Localized Detection Algorithm

EFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS

Node Clone Detection in Wireless Sensor Networks

Node Clone Detection in Wireless Sensor Networks

Temporal Key Based Randomized Efficient and Distributed Detection of Clone Attack in WSNs

Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN

Detection of Node Clone in Wireless Sensor Networks

DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS

Keywords:- Replication attack, security, wireless sensor networks, localized detection.

Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

Sequential Hypothesis Testing Based Approach for Replica Cluster Detection in Wireless Sensor Networks

Efficient and Effective Detection of Node Replication Attacks in Mobile Sensor Networks

Providing High Security for WSN s Using Distributed Hash Table (DHT)

Key Words: Wireless Sensor network, Clones, DHT, RDE.

Identity Replicas in WSN

Two Novel Approaches on the Node Clone Detection in Wireless Sensor Networks

On the Node Clone Detection in Sensor Networks for Electronic Copy Right Management System

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Black Hole Detection Scheme in WSN for Mobile Replica Node Detection and Rejection

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

Detection of Replica Nodes in Wireless Sensor Network: A Survey

Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division

Catching BlackHole Attacks in Wireless Sensor Networks

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

II Year M.E Student, #2 Assistant Professor #1, #2

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5, JUNE

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC)

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Chord-based Key Establishment Schemes for Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

CSC 774 Advanced Network Security

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

REPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS

WIRELESS SENSOR networks (WSNs), and particularly

Code Verification Work of Sybil Attack in Wireless Sensor Network

WSN Routing Protocols

A Security Infrastructure for Trusted Devices

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks

Reducing Routing Overhead In Manet Using Ncpr Protocol

A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS

hash chains to provide efficient secure solutions for DSDV [7].

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Improved Resilience against False Data Injection Attacks using PCRE Filtering Scheme

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

There into, Ei : Residual energy of each node in I round; Er : average energy of rest nodes in I round;

Location-Based Pairwise Key Establishments for Static Sensor Networks

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Key Management for Static Wireless Sensor Networks With Node Adding

An Efficient Key Management Scheme for Heterogeneous Sensor Networks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

Spoofing Attacks in wireless Sensor Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Link-Based Wormhole Detection in Wireless Sensor Networks

An Online Threshold Key Distribution Scheme for Symmetric Key Management

Detection of Sybil Attack in Wireless Sensor Network

Event Driven Routing Protocols For Wireless Sensor Networks

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

BISS: Building secure routing out of an Incomplete Set of Security associations

Social Closeness Based Clone Attack Detection for Mobile Healthcare System

AN ADAPTIVE ENERGY MANAGING ROUTING PROTOCOL TO IMPROVE ENHANCED THROUGHPUT IN WSN

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

Key establishment in sensor networks

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

MultiHop Routing for Delay Minimization in WSN

Transcription:

AN APPROACH TO DETECT NODE REPLICATION IN MOBILE SENSOR NETWORKS- SURVEY P. Edith Linda 1, R.Sangeetha 2 Assistant Professor, Department of Computer Science, G.R.Damodaran College of Science, Coimbatore, Tamilnadu 1 M.Phil Scholar, Department of computer Science, G.R.Damodaran College of Science, Coimbatore, Tamilnadu 2 ABSTRACT: In mobile sensor network (MSN), there are many nodes and they are unattended so an adversary can easily attack and compromise the sensor nodes and take private key from the nodes. In this paper we mainly focus on the detection of replication node in mobile sensor networks. Several algorithms are developed to detect the replica attacks, in static WSNs and mobile WSNs. Every technique has its own advantages and disadvantages. In recent years, detection of replication node is an important task to detect the node in wireless sensor network area. In our survey, we analyze previous year research and contributions of the existing techniques are Random key Pre distribution, SET, Deterministic Multicast, Randomized Multicast and Line Selected Multicast, Randomized Efficient and Distributed Mechanism, Localized Multicast, Sequential Probability Ratio Test, extremely Efficient Detection, Efficient And Distributed Detection. Keywords: mobile sensor network, clone attack, witness Node INTRODUCTION: A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that co function in order to achieve a common goal. A WSN can be expanded in harsh environments to fulfill both military and civil applications [1].Mobile Sensor networks could be used in applications such as environment monitoring and object tracking. Recently, due to the advance in robotics, mobile sensor networks become feasible and applicable. The small sensor nodes which are distributed over the network. These nodes sense the responsive message data from the location and send the responsive message to the sink node. The sink node will verify the data and its ID which is send by the sensor nodes[5].the sensor nodes are expand in hostile environment and the nodes are unattended which makes an adversary to judge the sensor nodes and make many clone of them. These clone nodes are dangerous to the network communication. These mobile sensors are used in variety of application including duplicate detection, border monitoring, and military patrols. It generates the maximum number of attacker controlled clones around the network. The dangerous attack is the compromised node attacks 1582

in which the adversary takes the private keying materials from a compromised node. An adversary can take the single sensor ID and make many clones of them [7]. Related Work The detection, based on the detection methodologies Detection for Static WSNs Detection for Mobile WSNs Detection for Stationary WSNs: The static WSNs detection of node replication attack in two types as centralized and distributed techniques. Centralized : In centralized techniques the detection process every node in the network sends its location claim to sink node through its neighboring nodes. Receiving the entire location claims, the sink node checks the node Ids along their location, and if it finds two other locations with the same ID, it raises a replica node. The sink node is considered to be a powerful central which is responsible for information convergence and decision making. Random key pre distribution: Random key pre distribution security schemes are well suited for use in sensor networks because of their low storage overhead. However, the security of a network using pre distributed keys can be compromised by cloning attacks. Cloning gives the adversary an easy way to build an army of replica nodes that can cripple the sensor network. Brooks proposed an algorithm that a sensor network can use to detect the existence of clones.random Keys that are present on the cloned nodes are detected by looking at how often they are used to authenticate nodes in the network.[1] SET: [2] algorithm is used to detect replicas by computing set operations of exclusive subsets in the network, using localized voting mechanism, a set of neighbor nodes can agree on the duplication of a given node that has been replicated within the neighborhood. This method fails to detect duplication nodes that are not within the same neighborhood. This algorithm is used to reduce the communication cost of the preceding approach by computing set operations of exclusive subsets in the network. SET then employs a tree structure to compute non overlapped set operations and integrates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. First, SET launches an Exclusive subset maximal independent set (ESMIS) algorithm which forms exclusive unit subsets among one-hop neighbors in an only one disjointed subset which are controlled by a head. Distributed : There is no essential rule exists, in distributed techniques and special detection mechanism called claimer reporter-witness frame work. Claimer reporter-witness frame work is provided in which the detection is performed by locally distributed node sending the location claim not to the sink node but to a randomly selected node called witness node. Detection for Static WSNs Centralized Distributed Random SET DM RM RED LM Key and Distribution LSM 1583

Deterministic Multicast (DM): [6] DM protocol is a claimer-reporter-witness framework. It is good example to explain claimer report-witness frame work. This protocol is used to improve the communication cost of the previous protocol. The claimer is a node which shares its location claim to its neighbor nodes, each neighbor node serving as a reporter. The reporter uses function to map the claimer ID to a witness node. Then the neighbor node forwards the claim to the witness. Witness will receive two different location claims for the same node ID if the adversary has replicated a node. There is a problem in Deterministic Multicast. If a replica knows the claimer s ID and function he/she will the witness s location. Then it compromises them before deploying his replication node. Randomized Multicast and Line Selected Multicast (RM and LSM): [8] the first protocol is called Randomized Multicast (RM) which is distributed node replica detection mechanism. It will select the witness of the node in randomly. The second protocol, Line-Selected Multicast (LSM), exploits the routing topology of the network to select witnesses for a node location. It utilizes geometric probability to detect replicated nodes. In RM, each node broadcasts a location claim to its one-hop neighbors. Then, each neighbor node chose randomly witness nodes within its communication range and forwards the location claim with a probability to the nodes nearest to selection locations by using geographic routing. RM protocol is high communication cost, parno et al. proposed another protocol to reduce the communication overhead and increase the probability of detection, which is called as lineselected multicast (LSM).In this protocol the location claim travel from one node to another node. If we compared with RM and LSM has a lower communication cost. It has a many drawbacks. Randomized, Efficient and Distributed Mechanism (RED): [4,5] It combines both characteristics of DM and RM, but this protocol uses the witness chosen by pseudo-randomly on a network-wide seed to improve network performance and a distributed protocol to detect the node replication attack..this protocol consist of two steps: In first step, a random value, rand, is shared between all the nodes in the network. In second step, is the detection phase, each node broadcasts its claim ID and location to its neighboring nodes. Each and every neighbor node that hears a claim sends (with probability p) to a set of g pseudo randomly chosen network places. The pseudo random function takes as an input ID, random number, and g. Each node in the path (from claiming node to the witness destination) forwards the data to its neighbor closest to the destination. It protects the witness nodes. The replicated node will be detected in every detection phase. Localized Multicast: [15] there are two distributed protocols for detecting node replication attacks called Single Deterministic Cell (SDC) and Parallel Multiple Probabilistic Cells (P-MPC). In both protocols, the overall Sensor network is split into cells to form a geographic grid. In SDC, every node ID is exclusively mapped to one of the cells in the grid. When executing detection method, every node broadcasts a location claim to its neighbor s node. Then, every neighbor forwards the location claim with a probability to an exclusive cell by executing a geographic hash function with the input of node ID. Once a location claim received by the destination cell by any node, the location claim is flooded by the entire cell. Since the location claims of clone nodes will be forwarded to the same cell, hence the clone nodes will be detected with certain probability. Like SDC, in the P-MPC algorithm, 1584

geographic hash function is employed to map node identity to the destination cells. However, instead of mapping to single deterministic cell, in P-MPC the location claim is mapped and forwarded to multiple deterministic cells with different probabilities. The rest of the process is similar to SDC. DETECTION TECHNIQUES FOR MOBILE WSNS: The node replica detection techniques developed for static WSNs. It do not work when the nodes are expected to move as in mobile WSNs. As a result some techniques have also been proposed for mobile WSNs. These techniques are improved to detect the replica node. These techniques are characterized into two main classes as centralized and distributed techniques. Centralized : 1. Sequential Probability Ratio Test (SPRT): [13] SPRT,which performs the following steps: In mobile sensor network each and every time a mobile node moves one location to another location, each of its neighbors asks for a signed claim containing its location and time interval information.it decides probabilistically whether to forward the received claim to the sink node. The sink node computes the speed from every two successive claims of a mobile node and performs the SPRT by taking speed as an observed sample. Each time maximum speed is exceeded by the mobile node; it will promote the random cross the upper limit and thus edge to the sink node accepting the alternate hypothesis that the mobile node has been replicated. On the other hand, each time the maximum speed of the mobile node is not reached; it will promote the random cross the lower limit. The sink node accepting the null hypothesis that mobile node has not been replicated and alternate hypothesis has been replicated. The exchange Hypothesis is accepted, the replica nodes will be removed from the network. Detection Technique for Mobile WSNs Centralized Sequential Probability Ratio Test (SPRT) Distributed : 1. extremely Efficient Detection (XED): [13] extremely Efficient Detection (XED), it s against the node replication attack in mobile sensor network. The idea behind XED is motivated from the observation that for the networks without clones, if sensor node i meets another sensor node j at earlier time and i sends the random numbers to j, i and j meets again and again, i can assertion weather this Extremely Efficient Detection (XED) Distributed Efficient Distributed Detection (EDD) is the node j met before requesting the random number r. This techniques developed to, challenge-andresponse and encounter-number, are fundamentally different from the others. The two sensor nodes i and j within the communication ranges of each other, first it will generate the random numbers and it will exchange their generated random numbers. The generated random numbers and received random number in their respective memory. To generate the random number they use the cryptographic hash function to store the node value. Here the replica does not possess the 1585

correct random number. This node can be attributed to the fact that each node detects the replica by itself and will detect the replica at different time period. The xed scheme is composed of two steps: online step and offline step. In offline step security parameter cryptographic hash functions stored in each node. In online step if one u encounter v for the first time, u node randomly generates,computes h( ), sends h( )to v. 2. Efficient and Distributed Detection of Node: [13] the idea behind EDD is motivated by some observations. For a network without replicas, the number of times, X1, in a node U encounters a particular node V, should be limited with the time period with high probability. The replicas V, the minimum number of times, X2, in which U encounters the replicas with same ID V, should be larger than a threshold within the equal time period. According to these observations, if each node can discriminate between these two cases, every node has the ability to identify the replicas. The EDD scheme is composed as two steps: offline step and online step.the offline step performed by the network before the sensor deployment. The objective is to calculate the parameters, length T of the time interval and threshold used for discrimination between the honest nodes and the replica nodes. The online step performed by each node per move. Each node checks the encountered nodes are replicas with the corresponding number of encounter at the time interval period. It has the lower communication overhead. Conclusion: This paper reviewed the various algorithms for detection of node replication attack. The existing systems are categorized into two techniques distributed and centralized. Both classes of algorithms experienced in detecting and preventing replica attacks, but both algorithms also have some drawbacks. However, the current study features the fact that there are still a lot of challenges and issues in replica detection algorithms. REFERENCES: [1] R. Brooks, P. Y. Govindaraju,M. Pirretti, N. Vijaykrishnan, and M. T.Kandemir, On the detection of clones in sensor networks usingrandom key predistribution, IEEE Transactions on Systems, Man and Cybernetics C, vol. 37, no. 6, pp. 1246 1258, 2007. [2] H. Choi, S. Zhu, and T. F. L. Porta, SET: detecting node clones in sensor networks, in Proceedings of the 3rd International on Security and Privacy in CommunicationNetworks(SecureComm 07), pp.341 350, September 2007. [3] M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, A randomized,efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, in Proceedings of the 8th ACM International Symposium on Mobile Ad HocNetworking and Computing (MobiHoc 07), pp. 80 89, September2007 [4] M. Conti, R. Di Pietro, L. Mancini, and A. Mei, Distributed detection of clone [attacks in wireless sensor networks, IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp.685 698, 2011. 1586

[5] L. Hu and D. Evans, Localization for Mobile Sensor Networks, Proc. ACM MobiCom, pp. 45-57, Sept. 2004. [6] L. Eschenauer and V. D. Gligor, A keymanagement scheme fordistributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41 47,Washington, DC, USA, November 2002. [7] J. Jung, V. Paxon, A.W. Berger, and H. Balakrishnan, FastPortscan Detection Using Sequential Hypothesis Testing, Proc.IEEE Symp. Security and Privacy, pp. 211-225, May 2004. [8] Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, in Proceedings of the IEEE Symposiumon Security and Privacy (IEEE S and P 05), pp. 49 63,May 2005. [9] A.Wald, Sequential Analysis, Dover, NewYork, NY,USA, 2004. [10] M. Yu, C. S. Lu, and S. Y. Kuo, Mobile sensor network resilientagainst node replication attacks, in Proceedings of the 5th AnnualIEEE Communications Society Conference on Sensor, Mesh and AdHoc Communications and Networks (SECON 08), pp. 597 599,June 2008. [11] C. M. Yu, C. S. Lu, and S. Y. Kuo, Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks, in Proceedings of the 70th IEEE Vehicular Technology Conference (VTC Fall 09), pp. 20 23, Anchorage, Alaska, USA, September 2009. [13] C. M. Yu, C. S. Lu, and S. Y. Kuo, Efficient and DistributedDetection of Node Replication Attacks in Mobile Sensor Networks, In Proceedings of the 70th IEEE Vehicular Technology Conference(VTC Fall 09), pp. 20 23, Anchorage, Alaska, USA, September2009. [14] B. Zhu,V. G. K.Addada, S. Setia, S. Jajodia, and S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in Proceedings of the 23rd Annual Computer Security ApplicationsConference (ACSAC 07), pp. 257 266, Miami Beach, Fla,USA,December 2007. [15] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L.Wang, Localized multicast: efficient and distributed replica detection in large-scale sensor networks, IEEE Transactions on Mobile Computing, vol. 9,no. 7, pp. 913 926, 2010. [16] Raju.M An Approach in detection of Replication Node in Wireles Sensor networks:survey International Journal of Computer Science and Information Technologies, Vol.5(1),2014,192-196. [17]Min-Shiang Hwang Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey International Journal of Network Security, Vol.16, No.5, PP.323-330, Sept.2014. [12] M. Yu, C. S. Lu, and S. Y. Kuo, Mobile sensor network resilientagainst node replication attacks, in Proceedings of the 5th AnnualIEEE Communications Society Conference on Sensor, Mesh and AdHoc Communications and Networks (SECON 08), pp. 597 599,June 2008. 1587