Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks

被引:0
|
作者
Cheng, Guo [1 ]
Guo, Songtao [1 ]
Yang, Yuanyuan [2 ]
Wang, Fei [1 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] SUNY Stony Brook, Dept Elect & Comp Engn, Stony Brook, NY 11794 USA
关键词
Wireless sensor networks; node attacks; replication; intrusion detection algorithms; monitor nodes; CLONE ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile environments where an adversary may physically capture some of the nodes in WSNs, and replicate them in a large number of clones, easily taking control of networks. A few solutions have been proposed to cope with this problem. However, these solutions cannot adapt to the change of the network size and have low detection efficiency for clone nodes. In order to discover the clone nodes fast, in this paper, we propose an improved LEACH (NI-LEACH) protocol to reduce the scale of the cluster by considering the residual energy of nodes and the optimal number of clusters. Furthermore, we design an intrusion detection algorithm to detect the replication attacks by introducing monitor nodes in the network so as to greatly reduce the occurrence of tampering with the information. Simulation results show that our proposed algorithm is simple yet efficient. An attacker can be detected with high probability while achieving approximately optimal throughput. The network's ability against the attack from clone nodes is greatly improved.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Coverage Improvement in Clustered Wireless Sensor Networks by Relocating Mobile Nodes based on Waypoints
    Mathur, Prateek
    Nielsen, Rasmus H.
    Prasad, Neeli R.
    Prasad, Ramjee
    [J]. 2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [32] Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
    Darra, Eleni
    Katsikas, Sokratis K.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 91 - 97
  • [33] Optimal distributed detection in clustered wireless sensor networks: The weighted median
    Tian, Qingjiang
    Coyle, Edward J.
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 375 - 386
  • [34] Clustered routing protocol with distributed intrusion detection for wireless sensor networks
    Yao, Lan
    Gao, Fu-Xiang
    Yu, Ge
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2008, 29 (10): : 1402 - 1405
  • [35] A clustered routing protocol with distributed intrusion detection for wireless sensor networks
    Yao, Lan
    An, Na
    Gao, Fuxiang
    Yu, Ge
    [J]. ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 395 - +
  • [36] Optimal fusion rule for distributed detection in clustered wireless sensor networks
    Aldalahmeh, Sami A.
    Ghogho, Mounir
    McLernon, Des
    Nurellari, Edmond
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2016, : 1 - 12
  • [37] Optimal fusion rule for distributed detection in clustered wireless sensor networks
    Sami A. Aldalahmeh
    Mounir Ghogho
    Des McLernon
    Edmond Nurellari
    [J]. EURASIP Journal on Advances in Signal Processing, 2016
  • [38] OPTIMIZED TRACKING AND DETECTION OF TARGET NODES IN WIRELESS SENSOR NETWORKS
    Niranchana, S.
    Dinesh, E.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 695 - 700
  • [39] Nodes scheduling for approximate event detection in wireless sensor networks
    Gao, Jing
    Li, Jian-Zhong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 : 11 - 18
  • [40] On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks
    Seddik, Karim G.
    Liu, K. J. Ray
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,