Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs

被引:12
作者
Chatterjee, Pinaki Sankar [1 ]
Roy, Monideepa [1 ]
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar, Odisha, India
关键词
wireless sensor networks; filtering theory; radio spectrum management; lightweight cloned-node detection algorithm; SSDF attacks; secure spectrum allocation; CWSN; cognitive wireless sensor networks; denial of service attack; DoS attack; malicious node; collaborative spectrum sensing decision; node cloning attack; maximum-match filtering algorithm; MMF algorithm; cloned-node detection algorithm; CND algorithm;
D O I
10.1049/iet-wss.2016.0065
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cognitive Wireless Sensor Networks (CWSNs) provide better bandwidth utilization when compared with normal wireless sensor networks. CWSNs use a technique called opportunistic spectrum access for data transfer. While doing so, however, CWSNs are subject to several security threats. The spectrum sensing data falsification attack comes under the DoS attack. In this attack, a malicious node sends a modified spectrum sensing report so that the resulting collaborative spectrum sensing decision becomes wrong and a good cognitive sensor node receives a wrong decision regarding the vacant spectrum band of other's network. In the presence of the node cloning attack, the solution of the SSDF attack becomes even more difficult. In the node cloning attack, the malicious node creates many clones of the compromised node in the network. In order to confuse the collaborative spectrum sensing system, the clone nodes can send false spectrum sensing reports in a large number. The maximum-match filtering (MMF) algorithm is used for making a secure spectrum sensing decision in CWSNs. The Cloned-Node Detection (CND) algorithm is proposed here to detect cloned nodes. This study also explains how the CND algorithm assists the MMF algorithm to make better spectrum sensing decisions by avoiding the node cloning attack.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 31 条
[1]   Cognitive Radio Sensor Networks [J].
Akan, Ozgur B. ;
Karli, Osman B. ;
Ergul, Ozgur .
IEEE NETWORK, 2009, 23 (04) :34-40
[2]  
Araujo A, 2012, P 2 INT C ADV COGN R, P34
[3]   Security in cognitive wireless sensor networks. Challenges and open problems [J].
Araujo, Alvaro ;
Blesa, Javier ;
Romero, Elena ;
Villanueva, Daniel .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012, :1-8
[4]   Cognitive Spectrum and its Security Issues [J].
Arkoulis, S. ;
Kazatzopoulos, L. ;
Delakouridis, C. ;
Marias, G. F. .
NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, :565-570
[5]  
Brown T.X., 2007, 2 INT C COGN RAD OR
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]   Base Station Controlled Spectrum Allocation Technique to Detect the PUE Attack in CWSN [J].
Chatterjee, Pinaki Sankar ;
Roy, Monideepa .
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, 2015, 31 :689-698
[8]   A Regression based Spectrum-Sensing Data -Falsification Attack Detection Technique in CWSN [J].
Chatterjee, Pinaki Sankar ;
Roy, Monideepa .
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, :48-53
[9]  
Chen CX, 2012, IEEE GLOB HIGH TECH
[10]  
Chen RL, 2008, IEEE INFOCOM SER, P31