Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks

被引:0
作者
G. Amudha
P. Narayanasamy
机构
[1] RMD Engineering College,Computer Science and Engineering
[2] PSG College of Technology,Networking and Computing
来源
Wireless Personal Communications | 2018年 / 102卷
关键词
Location and trust based replica detection; Aggregation; Wireless sensor networks; Attacker;
D O I
暂无
中图分类号
学科分类号
摘要
As wireless sensor networks (WSNs) are widely used in unattended environments, various physical attacks are occurred easily. In this paper, location and trust based replica detection (LTBRD) method is introduced to identify the replication attack in the wireless sensor network. As sensor nodes are not tamper proof, all the credentials can be copied into any number of nodes. In order to solve this issue, behavior based and certificate based trust along with location information is followed in our proposed LTBRD approach. Depending upon the location mismatch and the trust value the malicious node will be identified and it will be revoked from the network. In this approach, the efficiency of the algorithm is been achieved by aggregation as well as without aggregation. The performance of LTBRD is evaluated with the help of detection probability, energy consumption, network delay, memory requirement. The performance of LTBRD is proven theoretically and the result shows that the proposed algorithm outperforms well when compared with the existing algorithms such as RED and LSM.
引用
收藏
页码:3303 / 3321
页数:18
相关论文
共 23 条
[1]  
Pratihari HN(2013)A survey on security issues in wireless sensor network International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology 2 55-58
[2]  
Akyildiz IF(2002)Wireless sensor networks: A survey Computer Networks 38 393-422
[3]  
Su W(2004)Multilevel μTESLA: Broadcast authentication for distributed sensor networks ACM Transactions on Embedded Computing Systems (TECS) 3 800-836
[4]  
Sankarasubramaniam Y(2015)RSSI-based indoor localization using RSSI-with-angle-based localization estimation algorithm Sensor Networks and Data Communications 4 2-698
[5]  
Cayirci E(2011)Distributed detection of clone attacks in wireless sensor networks IEEE Transactions on Dependable and Secure Computing 8 685-1258
[6]  
Liu D(2006)Indoor localization system using RSSI measurement of WSN based on ZigBee standard Target 538 050-undefined
[7]  
Ning P(2014)How do you compute the midpoint of an interval? ACM Transactions on Mathematical Software (TOMS) 40 11-undefined
[8]  
Yves AJ(2007)On the detection of clones in sensor networks using random key predistribution IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 37 1246-undefined
[9]  
Hao P(undefined)undefined undefined undefined undefined-undefined
[10]  
Conti M(undefined)undefined undefined undefined undefined-undefined