Title :
Location and Time Based Clone Detection in Wireless Sensor Networks
Author :
Sivaraj, R. ; Thangarajan, R.
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India
Abstract :
A Wireless Sensor Network (WSN) consists of several sensor nodes that are deployed in a aggressive environment to monitor and record the changes that take place in certain parameters of the environment. Sensor nodes that can communicate with each other over a wireless channel can be captured and compromised by an adversary. After such a compromise an adversary can replicate a few sensor nodes, and insert arbitrary number of replicas in the network field to undermine the operation of the network. Several clone detection protocols have been proposed in the literature as a framework to maximize the lifetime and security of the wireless sensor network. These are based on device types, deployment strategies, detection methodologies and detection ranges and try to mitigate the threat against wireless sensor networks. The Location Claim Approach is an effective clone detection protocol based on grid deployment. It can detect the clone nodes by sending each node´s location claim (location and ID) to other nodes in a predetermined zone. However there are certain limitations in the current study. The unnecessary forwarding of location claim between the sensor nodes will increase the claim storage, communication and computation overhead. Hence in the proposed study the methodology is developed to overcome these problems by making the deployment location more accurate. This is achieved by assigning the time interval for all sensor nodes. Hence in this proposed work, an erroneously deployed node which is marked as untrusted node finishes the neighbor discovery before the time interval. Therefore it can be remarked as trusted node. Finally the total energy consumed by the proposed method consumes less energy.
Keywords :
protocols; sensor placement; telecommunication power management; telecommunication security; wireless sensor networks; clone detection protocols; deployment location; deployment strategy; grid deployment; neighbor discovery; node identification; sensor location; sensor node replication; time based clone detection; time interval; untrusted node; wireless sensor network lifetime; wireless sensor network security; Base stations; Cloning; Energy consumption; Protocols; Security; TV; Wireless sensor networks; Clone attacks; deployment time interval; location claims; replica nodes; wireless sensor networks;
Conference_Titel :
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
Conference_Location :
Bhopal
Print_ISBN :
978-1-4799-3069-2
DOI :
10.1109/CSNT.2014.35