DocumentCode :
568470
Title :
An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks
Author :
Naruephiphat, Wibhada ; Ji, Yusheng ; Charnsripinyo, Chalermpol
Author_Institution :
Nat. Electron. & Comput. Technol. Center, Pathumthani, Thailand
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
745
Lastpage :
750
Abstract :
Typical wireless sensor networks have restricted resources on memory capacity, computing/processing power, and energy supply. However, wireless sensor network has been increasingly applied to various applications and security in wireless sensor networks has become an essential and challenging issue. There is a wide range of security attacks in wireless sensor networks. A node replication attack is a type of attacks in wireless sensor networks. An attacker can be easily disguised in a wireless sensor network and acts as an intermediate node to intercept data packets. The attacker could be a clone node in the network by capturing nodes´ ID, the pair-wise key etc. The base station may not be able to distinguish between good nodes and malicious nodes. In this paper, we present a new method, named Area-Based Clustering Detection (ABCD) method, for detecting node replication attacks. Our simulation results show that the proposed ABCD method can achieve high successful detection rate while decrease the communication overheads when compared with the Line-Selected Multicast (LSM) method previously proposed in the literature. The proposed ABCD method can also maintain the network lifetime and decrease the number of stored messages when compared with a centralized approach.
Keywords :
telecommunication network reliability; telecommunication security; wireless sensor networks; ABCD method; LSM method; area-based clustering detection method; base station; clone node; communication overhead; computing-processing power; energy supply; intermediate node; line-selected multicast method; memory capacity; network lifetime; node ID; node replication attack detection; pair-wise key; security attacks; wireless sensor network security; Base stations; Network topology; Protocols; Relays; Security; Simulation; Wireless sensor networks; Centralized detection; Node replication detection; Wireless sensor network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.73
Filename :
6296044
Link To Document :
بازگشت