DocumentCode
568470
Title
An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks
Author
Naruephiphat, Wibhada ; Ji, Yusheng ; Charnsripinyo, Chalermpol
Author_Institution
Nat. Electron. & Comput. Technol. Center, Pathumthani, Thailand
fYear
2012
fDate
25-27 June 2012
Firstpage
745
Lastpage
750
Abstract
Typical wireless sensor networks have restricted resources on memory capacity, computing/processing power, and energy supply. However, wireless sensor network has been increasingly applied to various applications and security in wireless sensor networks has become an essential and challenging issue. There is a wide range of security attacks in wireless sensor networks. A node replication attack is a type of attacks in wireless sensor networks. An attacker can be easily disguised in a wireless sensor network and acts as an intermediate node to intercept data packets. The attacker could be a clone node in the network by capturing nodes´ ID, the pair-wise key etc. The base station may not be able to distinguish between good nodes and malicious nodes. In this paper, we present a new method, named Area-Based Clustering Detection (ABCD) method, for detecting node replication attacks. Our simulation results show that the proposed ABCD method can achieve high successful detection rate while decrease the communication overheads when compared with the Line-Selected Multicast (LSM) method previously proposed in the literature. The proposed ABCD method can also maintain the network lifetime and decrease the number of stored messages when compared with a centralized approach.
Keywords
telecommunication network reliability; telecommunication security; wireless sensor networks; ABCD method; LSM method; area-based clustering detection method; base station; clone node; communication overhead; computing-processing power; energy supply; intermediate node; line-selected multicast method; memory capacity; network lifetime; node ID; node replication attack detection; pair-wise key; security attacks; wireless sensor network security; Base stations; Network topology; Protocols; Relays; Security; Simulation; Wireless sensor networks; Centralized detection; Node replication detection; Wireless sensor network;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.73
Filename
6296044
Link To Document