Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

11-05-2016

Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks

Authors: P. Uma Maheswari, P. Ganesh Kumar

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks are often deployed in adverse environments where an attackers can physically capture some of the nodes, first can reconstruct the programme, and then, can replicate them in large number of clones, easily takeover the control of network. Wireless Sensor Networks highly indispensable for securing network protection. Various kinds of major attacks have been documented in wireless sensor network, till now by many researchers. The Clone attack is a massive harmful attack against the sensor network where large number of genuine replicas are used for illegal entry into a network. Discerning the Clone attack, Sybil attack, sinkhole, and wormhole attack while multicasting is a excellent job in the wireless sensor network. The existing method Randomised, Efficient, and Distributed (RED) has only a scheme of self-healing mechanism, which just verifies the node identities by analyzing the neighbours. A survey was done on a Clone attack on the objective of dissolving this problem. The overview of survey has proposed a combined PVM (position verification method) with MVP (Message Verification and Passing) for detecting, eliminating, and eventually preventing the entry of Clone nodes within the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rathod, V., & Mehta, M. (2011). Security in wireless sensor network: a survey. Ganpat University Journal of Engineering & Technology, 1, 35–44. Rathod, V., & Mehta, M. (2011). Security in wireless sensor network: a survey. Ganpat University Journal of Engineering & Technology, 1, 35–44.
2.
go back to reference Modirkhazeni, A., Ithnin, N., & Abbasi, M. (2012). Secure hierarchical routing protocols inwireless sensor network; security survey analysis. International Journal of Computer Communications and Networks, 2, 6–16. Modirkhazeni, A., Ithnin, N., & Abbasi, M. (2012). Secure hierarchical routing protocols inwireless sensor network; security survey analysis. International Journal of Computer Communications and Networks, 2, 6–16.
3.
go back to reference Niu, W., Lei, J., Tong, E., et al. (2014). Context-aware service ranking in wireless sensor networks. Journal of Network and Systems Management, 22(1), 50–74.CrossRef Niu, W., Lei, J., Tong, E., et al. (2014). Context-aware service ranking in wireless sensor networks. Journal of Network and Systems Management, 22(1), 50–74.CrossRef
4.
go back to reference Baig, Z. A. (2011). Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications, 34(3), 468–484.CrossRef Baig, Z. A. (2011). Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications, 34(3), 468–484.CrossRef
5.
go back to reference Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Application, 2, 911–916. Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Application, 2, 911–916.
6.
go back to reference Abbas, S., Merabti, M., & Llewellyn-Jones, D. (2009). Signal strength based Sybil attack detection in wireless Ad Hoc networks. In Proceedings of the 2nd international conference on development in esystems engineering (DESE’09), pp. 190–195, Abu Dhabi, UAE, December 2009. Abbas, S., Merabti, M., & Llewellyn-Jones, D. (2009). Signal strength based Sybil attack detection in wireless Ad Hoc networks. In Proceedings of the 2nd international conference on development in esystems engineering (DESE’09), pp. 190–195, Abu Dhabi, UAE, December 2009.
7.
go back to reference Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal of Engineering Science & Advanced Technology, 2, 256–262. Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal of Engineering Science & Advanced Technology, 2, 256–262.
8.
go back to reference Ssu, K.-F., Wang, W.-T., & Chang, W.-C. (2009). Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks, 53(18), 3042–3056.CrossRefMATH Ssu, K.-F., Wang, W.-T., & Chang, W.-C. (2009). Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks, 53(18), 3042–3056.CrossRefMATH
9.
go back to reference Vasudeva, A., & Sood, M. (2012). Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security & Its Applications, 4(5), 135–147.CrossRef Vasudeva, A., & Sood, M. (2012). Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security & Its Applications, 4(5), 135–147.CrossRef
10.
go back to reference Balachandaran, N., & Sanyal, S. (2012). A review of techniques to mitigate sybil attacks. International Journal of Advanced Networking and Applications, 4, 1–6. Balachandaran, N., & Sanyal, S. (2012). A review of techniques to mitigate sybil attacks. International Journal of Advanced Networking and Applications, 4, 1–6.
11.
go back to reference Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in WSN. In Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on (Vol. 2, pp. 1468–1473). IEEE. Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in WSN. In Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on (Vol. 2, pp. 1468–1473). IEEE.
12.
go back to reference Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre-distribution. Systems, Man, and Cybernetics—Part C: Applications And Reviews, IEEE Transactions on, 37(6), 1246–1258.CrossRef Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre-distribution. Systems, Man, and Cybernetics—Part C: Applications And Reviews, IEEE Transactions on, 37(6), 1246–1258.CrossRef
13.
go back to reference Wen, H., Luo, J., & Zho, L. (2011). Lightweight and effective detection scheme for node clone attack in wireless sensor networks. Wireless Sensor Systems, IET, 1(3), 137–143. Wen, H., Luo, J., & Zho, L. (2011). Lightweight and effective detection scheme for node clone attack in wireless sensor networks. Wireless Sensor Systems, IET, 1(3), 137–143.
14.
go back to reference Naruephiphat, W., Ji, Y., & Charnsripinyo, C. (2012). An area-based approach for node replica detection in wireless sensor networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 745–750). IEEE. Naruephiphat, W., Ji, Y., & Charnsripinyo, C. (2012). An area-based approach for node replica detection in wireless sensor networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 745–750). IEEE.
15.
go back to reference Jing-Jing, G., Jin-Shuang, W., Yu-Sen, Z., & Tao, Z. (2011). Formal threat analysis for ad-hoc routing protocol: modelling and checking the sybil attack. Intelligent Automation & Soft Computing, 17(8), 1035–1047.CrossRef Jing-Jing, G., Jin-Shuang, W., Yu-Sen, Z., & Tao, Z. (2011). Formal threat analysis for ad-hoc routing protocol: modelling and checking the sybil attack. Intelligent Automation & Soft Computing, 17(8), 1035–1047.CrossRef
16.
go back to reference Komar, C., Donmez, M. Y., & Ersoy, C. (2012). Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Computer Communications, 35(10), 1185–1199.CrossRef Komar, C., Donmez, M. Y., & Ersoy, C. (2012). Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Computer Communications, 35(10), 1185–1199.CrossRef
17.
go back to reference Amuthavalli, R., & Bhuvaneswaran, R. S. (2013). Detection and prevention of sybil attack in wireless sensor network employing random password comparison method. Journal of Theoretical and Applied Information Technologygy, 67, 236–246. Amuthavalli, R., & Bhuvaneswaran, R. S. (2013). Detection and prevention of sybil attack in wireless sensor network employing random password comparison method. Journal of Theoretical and Applied Information Technologygy, 67, 236–246.
18.
go back to reference Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer science and Information Security, 4(1), 2. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer science and Information Security, 4(1), 2.
19.
go back to reference Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2007). A randomizes efficient, and distributed protocal for the detection of node replication attacks in wireless sensor networks. Proceedings of Mobihoc 07, pp. 80–89. Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2007). A randomizes efficient, and distributed protocal for the detection of node replication attacks in wireless sensor networks. Proceedings of Mobihoc 07, pp. 80–89.
20.
go back to reference Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4, 1–9. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4, 1–9.
21.
go back to reference Xiao, L., Greenstein, J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.CrossRef Xiao, L., Greenstein, J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.CrossRef
22.
go back to reference Tangpong, A. (2010). Managing sybil identities in distributed systems [Ph.D. thesis], Pennsylvania State University. Tangpong, A. (2010). Managing sybil identities in distributed systems [Ph.D. thesis], Pennsylvania State University.
23.
go back to reference Yu, H., Gibbons, P. B., Kaminsky, M. & Xiao, F. (2010). SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking, 18(3), 885–898.CrossRef Yu, H., Gibbons, P. B., Kaminsky, M. & Xiao, F. (2010). SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking, 18(3), 885–898.CrossRef
24.
go back to reference Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal Volume 2015, Article ID 841267. doi:10.1155/2015/841267 Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal Volume 2015, Article ID 841267. doi:10.​1155/​2015/​841267
Metadata
Title
Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
Authors
P. Uma Maheswari
P. Ganesh Kumar
Publication date
11-05-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3357-y

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue