Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)

被引:9
|
作者
Shaukat, Haafizah Rameeza [1 ]
Hashim, Fazirulhisyam [1 ]
Shaukat, Muhammad Arslan [2 ]
Alezabi, Kamal Ali [3 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43400, Selangor, Malaysia
[2] Univ Technol Sydney, Sch Engn & Informat Technol, Sydney, NSW 2007, Australia
[3] UCSI Univ, Sch Informat Technol, FoBIS, Kula Lumpur 56000, Malaysia
关键词
mobile wireless sensor network; hybrid; node replication attack; danger theory; danger zone; wireless sensor network; NODE REPLICATION ATTACKS; INJECTED FALSE DATA; PROTOCOL;
D O I
10.3390/s20082283
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [2] Detection and Mitigation of Node Replication with Pulse Delay Attacks in Wireless Sensor Network
    Umrao, Sachin
    Verma, Deeksha
    Tripathi, Arun Kumar
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 390 - +
  • [3] A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory
    Alaparthy, Vishwa Teja
    Morgera, Salvatore Domenic
    IEEE ACCESS, 2018, 6 : 47364 - 47373
  • [4] Detection of clone node attack in mobile wireless sensor network with optimised cost function
    Ansari, Mohammad Hassan
    Vakili, Vahid Tabataba
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 24 (03) : 149 - 159
  • [5] Smart Multi-Level Tool for Remote Patient Monitoring Based on a Wireless Sensor Network and Mobile Augmented Reality
    Jimenez Gonzalez, Fernando Cornelio
    Vergara Villegas, Osslan Osiris
    Torres Ramirez, Dulce Esperanza
    Cruz Sanchez, Vianey Guadalupe
    Ochoa Dominguez, Humberto
    SENSORS, 2014, 14 (09) : 17212 - 17234
  • [6] Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, Aduwati
    Rasid, M. Fadlee Abdul
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [7] Lifetime of multi-level heterogeneous wireless sensor networks
    Xing, Jianping
    Yu, Qicai
    Zhou, Yan
    Jun, Zhang
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 1617 - 1621
  • [8] An efficient tree-based clone detection scheme in wireless sensor network
    Lalar, Sachin
    Bhushan, Shashi
    Surender
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (05): : 1003 - 1023
  • [9] Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohammed Naufal Bin Mohammed
    Xiang, Yang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [10] Detection and Mitigation of Sinkhole Attack in wireless sensor network
    Kaur, Manpreet
    Singh, Amarvir
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 217 - 221