Wireless Sensor-Based Enhanced Security Protocol to Prevent Node Cloning Attack

被引:0
作者
Meganathan, S. [1 ]
Kumar, N. Rajesh [1 ]
Shah, S. Sheik Mohideen [1 ]
Sumathi, A. [1 ]
Santhoshkumar, S. [2 ]
机构
[1] SASTRA Deemed Univ, Dept Comp Sci & Engn, Kumbakonam 612001, Tamil Nadu, India
[2] Alagappa Univ, Dept Comp Sci, Karaikkudi, Tamil Nadu, India
来源
COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING ( ICCVBIC 2021) | 2022年 / 1420卷
关键词
Wireless sensor network; Cloning attack; Location-based key; Elliptical curve cryptography (ECC); Security protocol;
D O I
10.1007/978-981-16-9573-5_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network is the collection of low-power, independent wireless sensor node. Wireless sensor networks are generally deployed in mission-critical environment like battlefield surveillance, industrial process monitoring, etc. The nodes in the network are generally unattended by humans and hostile environment in which they are deployed to make the node vulnerable to many security attacks. One such attack is the node cloning attack, where the attacker will create the clone or replica of Legitimate Node by copying its cryptographic information into the clone node. Using the copied cryptographic information, clone node can further launch range of attacks in network like eavesdropping or raising false alarm, etc. In this paper, we have discussed the security protocol to prevent the clone node from implementing any successful attack in network. The security protocol is designed in such a way that it prevents the attacker from gaining the required cryptographic information. This is achieved by storing the partial cryptographic information which can only be completed by Legitimate Node. Node will be using location-based information to generate complete cryptographic information.
引用
收藏
页码:603 / 615
页数:13
相关论文
共 18 条
[1]  
Anjali A., 2012, INT J ADV RES COMPUT, V2
[2]  
badr, 2012, IJCSI INT J COMPUT S, V9
[3]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[4]   Real Time Analysis of a 24 GHz Planar Microstrip Antenna for Vehicular Communications [J].
Christina, G. ;
Rajeswari, A. ;
Mathivanan, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) :1129-1139
[5]   Autonomous profile-based anomaly detection system using principal component analysis and flow analysis [J].
Fernandes, Gilberto, Jr. ;
Rodrigues, Joel J. P. C. ;
Proenca, Mario Lemes, Jr. .
APPLIED SOFT COMPUTING, 2015, 34 :513-525
[6]  
Hajibegloo M., 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), P62, DOI 10.1109/DICTAP.2012.6215404
[7]   Energy-aware intelligent hybrid routing protocol for wireless sensor networks [J].
Ibrahim, Mostafa E. A. ;
Ahmed, Alaa E. S. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (03)
[8]   Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey [J].
Khan, Wazir Zada ;
Aalsalem, Mohammed Y. ;
Saad, Mohammed Naufal Bin Mohammed ;
Xiang, Yang .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[9]  
Kulkarni N, J MOB MULTIMEDIA, V17
[10]   Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications [J].
Mitchell, Robert ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (03) :1254-1263