Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks

被引:0
|
作者
Cheng, Guo [1 ]
Guo, Songtao [1 ]
Yang, Yuanyuan [2 ]
Wang, Fei [1 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] SUNY Stony Brook, Dept Elect & Comp Engn, Stony Brook, NY 11794 USA
关键词
Wireless sensor networks; node attacks; replication; intrusion detection algorithms; monitor nodes; CLONE ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile environments where an adversary may physically capture some of the nodes in WSNs, and replicate them in a large number of clones, easily taking control of networks. A few solutions have been proposed to cope with this problem. However, these solutions cannot adapt to the change of the network size and have low detection efficiency for clone nodes. In order to discover the clone nodes fast, in this paper, we propose an improved LEACH (NI-LEACH) protocol to reduce the scale of the cluster by considering the residual energy of nodes and the optimal number of clusters. Furthermore, we design an intrusion detection algorithm to detect the replication attacks by introducing monitor nodes in the network so as to greatly reduce the occurrence of tampering with the information. Simulation results show that our proposed algorithm is simple yet efficient. An attacker can be detected with high probability while achieving approximately optimal throughput. The network's ability against the attack from clone nodes is greatly improved.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] A wormhole attack detection algorithm in wireless sensor networks
    [J]. Dong, X.-M. (dongxiaomei@ise.neu.edu.cn), 1600, Northeast University (33):
  • [22] Detection & Prevention of Vampire Attack in Wireless Sensor Networks
    Sharma, Mayank Kumar
    Joshi, Brijendra Kumar
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [23] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [24] Secure localization with attack detection in wireless sensor networks
    Zhu, Wen Tao
    Xiang, Yang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (03) : 155 - 171
  • [25] On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
    Ngai, Edith C. H.
    Liu, Jiangchuan
    Lyu, Michael R.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3383 - 3389
  • [26] Dynamic Detection of Clone Attack in Wireless Sensor Networks
    Sathish, R.
    Kumar, D. Rajesh
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 501 - 505
  • [27] Method of detecting the replication attack based on zoning in wireless sensor networks
    Ren, Xiu-Li
    Yang, Wei
    Xue, Jian-Sheng
    Yin, Feng-Jie
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (09): : 2095 - 2100
  • [28] A Modified Algorithm and Protocol for Replication Attack and Prevention for Wireless Sensor Networks
    Shimpi, Bhagyashree
    Shrivastava, Sameeksha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [29] An intelligent based healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks
    Anitha, S.
    Jayanthi, P.
    Chandrasekaran, V
    [J]. MEASUREMENT, 2021, 167
  • [30] A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks
    Dargahi, Farnaz
    Rahmani, Amir Masoud
    Samadabadi, Reza
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 477 - 481