Energy Consumption Analysis Of Clone Detection Approaches In Wireless Sensor Networks

Ravi .T*, 0**
* Student, Department of Electronics and Communication Engineering, SreeVidyanikethan Engineering College, Tirupathi, A.P., India.
** Professor of ECE and Dean (Academics), Department of Electronics and Communication Engineering, Sree Vidyanikethan Engineering College, Tirupathi, A.P., India.
Periodicity:July - September'2014
DOI : https://doi.org/10.26634/jwcn.3.2.2874

Abstract

Wireless Sensor Network (WSN) is a group of sensor nodes which acquaint themselves over wireless channels and adversary who tries to capture and compromise nodes of a network. An adversary introduces clone to compromise larger area and extracts the secret keys from the sensor node or reprogram them. Clone attack is very hazardous and should be detected as soon as possible to protect our network. Recently, different clone detection schemes where proposed for WSNs, taking into consideration various network configurations and deployment strategies. In this paper the analysis is done on the existing clone detection schemes with regard to their device type, detection methodology, deployment strategy, and detection ranges. Simulation experiments are conducted to show variations in their performance. Finally, the authors are concluding that Randomized, Efficient and Distributed (RED), and Parallel Multiple Probabilistic Cells (P-MPC) schemes have shown good results for static sensors (under random uniform deployment and grid deployment respectively) compared to other schemes which the authors have been taken into consideration. For mobile sensor networks there is no such efficiently working scheme with existing approaches because of its maneuverability.

Keywords

Clone Attack, Clone Detection, Network Security, Deployment Strategy, Wireless Sensor Network (WSN)

How to Cite this Article?

Theja, G.R., and Subhas, C. (2014). Energy Consumption Analysis Of Clone Detection Approaches In Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 3(2), 10-16. https://doi.org/10.26634/jwcn.3.2.2874

References

[1]. K. Cho, Minho Jo, T. Kwon, Hsiao-Hwa Chen, and D. H. Lee, (2013), “Classification and experimental analysis for clone detection approaches in wireless sensor network,” in IEEE Systems Journal, Vol. 7, No. 1, pp. 26-35.
[2]. B.Parno, A, Perrig, and V. Gligor, (2005), “Distributed detection of node replication attacks in sensor network,” in Proc, IEEE Symp. Security Privacy, pp. 49-63.
[3]. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrihnan, and M.T. Kandemir, (2007), “On the detection of clones in sensor networks using random key predistribution,” IEEE Trans. Syst. Man Cybern., Vol. 37, No.6,pp. 1246-1258.
[4]. K. Xing, F. Liu, X. Cheng, and D. H. C. Du, (2008), ”Realtime detection of clone attacks in wireless sensor networks,” in Proc. ICDCS, pp. 3-10.
[5]. M. Conti, R. Pietro, L. V. Mancini, and A. Mei, (2007), “A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput., pp. 80–89.
[6]. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, (2010), “Localized multicast: Efficient and distributed replica detection in large-scale sensor networks,” IEEE Trans. Mobile Comput., Vol. 9, No. 7, pp. 913–926.
[7]. J. W. Ho, D. Liu, M. Wright, and S. K. Das, (2009), “Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks,” Ad Hoc Netw., Vol. 7, No. 8, pp. 1476–1488.
[8]. J. W. Ho, M. Wright, and S. K. Das, (2009), “Fast detection of replica node attacks in mobile sensor networks using sequential analysis,” in Proc. IEEE Int. Conf. Comput. Commun., pp. 1773–1781.
[9]. C. M. Yu, C. S. Lu, and S. Y. Kuo, (2008), “Mobile sensor network resilient against node replication attacks,” in Proc. IEEE Commun. Soc. Conf. Sensor Mesh Ad Hoc Commun. Netw., pp. 597–599.
[10]. L. Zhang, Y. Hu, and Q. Wu, (2010), “Identity-based threshold broadcast encryption in the standard model,” KSII Trans. Internet Inform. Syst., Vol. 4, No. 3, pp. 400–410.
[11]. The Network Simulator, ns-2 [Online]. Available: http://www.isi.edu/nsnam/ns
[12]. W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, (2004), “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. IEEE Int. Conf. Comput. Commun., pp. 586–597.
[13]. D. Liu, P. Ning, and W. Du, (2005), “Group-based key pre-distribution in wireless sensor networks,” in Proc. ACM Workshop Wirel. Security, pp. 11–20.
[14]. W. Du, L. Fang, and P. Ning, (2005), “LAD: Localization anomaly detection for wireless sensor networks,” in Proc. IEEE IPDPS, p. 41a.
[15]. W. Du, R. Wang, and P. Ning, (2005), “An efficient scheme for authenticating public keys in sensor networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput., pp. 58–67.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.