Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks

被引:64
作者
Amudha, G. [1 ]
Narayanasamy, P. [2 ]
机构
[1] RMD Engn Coll, Comp Sci & Engn, Madras, Tamil Nadu, India
[2] PSG Coll Technol, Networking & Comp, Coimbatore, Tamil Nadu, India
关键词
Location and trust based replica detection; Aggregation; Wireless sensor networks; Attacker; ATTACKS;
D O I
10.1007/s11277-018-5369-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As wireless sensor networks (WSNs) are widely used in unattended environments, various physical attacks are occurred easily. In this paper, location and trust based replica detection (LTBRD) method is introduced to identify the replication attack in the wireless sensor network. As sensor nodes are not tamper proof, all the credentials can be copied into any number of nodes. In order to solve this issue, behavior based and certificate based trust along with location information is followed in our proposed LTBRD approach. Depending upon the location mismatch and the trust value the malicious node will be identified and it will be revoked from the network. In this approach, the efficiency of the algorithm is been achieved by aggregation as well as without aggregation. The performance of LTBRD is evaluated with the help of detection probability, energy consumption, network delay, memory requirement. The performance of LTBRD is proven theoretically and the result shows that the proposed algorithm outperforms well when compared with the existing algorithms such as RED and LSM.
引用
收藏
页码:3303 / 3321
页数:19
相关论文
共 27 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2009, 2009 INT C ULTR TEL
[3]  
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[4]  
[Anonymous], 2006, TARGET
[5]  
Baker D. J., 1981, 2nd International Conference on Distributed Computing Systems, P476
[6]  
Braginsky D., 2002, P 1 ACM INT WORKSH W, P22, DOI DOI 10.1145/570738.570742
[7]   On the detection of clones in sensor networks using random key predistribution [J].
Brooks, Richard ;
Govindaraju, P. Y. ;
Pirretti, Matthew ;
Vijaykrishnan, N. ;
Kandemir, Mahmut T. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1246-1258
[8]   SET: Detecting node clones in sensor networks [J].
Choi, Heesook ;
Zhu, Sencun ;
La Porta, Thomas F. .
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, :341-350
[9]   Distributed Detection of Clone Attacks in Wireless Sensor Networks [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi Vincenzo ;
Mei, Alessandro .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :685-698
[10]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80