CLONE NODE DETECTION AND RECTIFICATION OF WIRELESS SENSOR NETWORK
Narayanasamy S 1, Suryavarshini .S2 Sureshkumar S3 M.P Revathi4 S.Harthy Ruby Priya5
Assistant Professor1&3,5, Department of Computer Science and Engineering, J.J College of Engineering and Technology, Trichy, India
Professor4, Department of Computer Science and Engineering, J.J College of Engineering and Technology,
Trichy, India
PG Student2, Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Coimbatore, India
Abstract-A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, multiple types of memory (program, data and flash memories), a RF transceiver, a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. Sensor nodes that are deployed in hostile environments are vulnerable to capture and compromise. An adversary may obtain private information from these sensors, clone and intelligently deploy them in the network to launch a variety of insider attacks. The defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory).A few distributed solutions to address this fundamental problem are not satisfactory. First, they are energy and memory demanding to be used in the WSN-resource constrained environment. Further, they are vulnerable to the certain adversary models. Hence we make the solutions of this work in threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new self-healing, distributed hash table DHT-Based Protocol for the detection of node replication attacks, and we show that it satisfies the introduced requirements. Finally, extensive simulations show that our protocol is highly efficient in communication, memory, and computation.
Keywords: distributed hash table, tamper-proof, Replication attack