Research Article

Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks

by  Mohammad Hasan Ansari, Vahid Tabataba Vakili
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Issue 21
Published: June 2013
Authors: Mohammad Hasan Ansari, Vahid Tabataba Vakili
10.5120/12608-9417
PDF

Mohammad Hasan Ansari, Vahid Tabataba Vakili . Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks. International Journal of Computer Applications. 71, 21 (June 2013), 5-12. DOI=10.5120/12608-9417

                        @article{ 10.5120/12608-9417,
                        author  = { Mohammad Hasan Ansari,Vahid Tabataba Vakili },
                        title   = { Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 71 },
                        number  = { 21 },
                        pages   = { 5-12 },
                        doi     = { 10.5120/12608-9417 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Mohammad Hasan Ansari
                        %A Vahid Tabataba Vakili
                        %T Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks%T 
                        %J International Journal of Computer Applications
                        %V 71
                        %N 21
                        %P 5-12
                        %R 10.5120/12608-9417
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended protocols in this area have not been experimentalised, also no comprehensive study has been performed on the possibility and capability of these procedures; in this paper all types of sensor network architecture, with the presence of mobile sensor node, are analyzed. Then according to the type of architecture, the procedures of clone node intrusion detection is classified and meticulously scrutinized. Besides, due to measuring the efficiency, exploiting the optimum parameters and also appraising the expenses of procedures, via using OMNeT++ simulator, these procedures are analyzed by comprehensive simulation. Finally, the conclusion based on theoretical analysis and simulation is presented

References
  • Chen et al, Sensor Network Security: A Survey. IEEE Communications Survey and Tutorials. Vol 11, No2, Second Quarter 2009
  • W. T. Zhu et al, Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications 2012 1022-1034
  • Michael Riecker et al, A Survey on Intrusion Detection in Wireless Sensor Networks. Technical Report, SEEMOO-TR- 2011
  • V. Manjula et al, Replication attack mitigations for static and mobileWSN. International Journal of Network Security and Its Applications (IJNSA), Vol. 3, No. 2, March2011
  • S. K. Das et al, A synopsis on node compromise detection in wireless sensor networks using sequential analysis. Computer Communications 34 2011 2003-2012
  • Roberto Di Pietro et al, Securing Mobile Unattended WSNs against a Mobile Adversary. IEEE 2010
  • Bryan Parno et al, Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE 2005
  • Ming Zhang et al, Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. IEEE2009
  • Ho et al, Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Transactions on Mobile Computing, Vol. 10, No. 6, June 2011
  • J. -W. Ho et al, Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Networks 10 2012 512-523
  • YanYxainaxniga and et al, Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks. International Workshop on Information and Electronics Engineering (IWIEE) 2012
  • Chia-Mu Yu et al, Mobile Sensor Network Resilient against Node Replication Attacks. IEEE 2008
  • Deng XM, Xiong Y, A new protocol for the detection of node replication attacks in mobile wireless sensor networks. Journal of Computer Science and Technology 26(4): 732- 743 July2011
  • Xiaoming Deng et al, Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communication 2010
  • Mauro Conti et al, Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. EURASIP Journal on Wireless Communications and Networking Volume,Article ID 9459432009
  • Mauro Conti et al, Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. WiSec?08, March 31- April 2, Alexandria, Virginia, USA. , 2008
  • Chia-Mu Yu et al, Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE2009
  • Liang-Min Wang et al, Patrol Detection for Replica Attacks on Wireless Sensor Networks. Sensors 11, 2496-2504; doi:10. 3390/s1103024962011
  • Emil Selvan et al. , Detection of Compromised Nodes in Mobile Ad-Hoc Networks. Journal of Computational Information Systems 7:62011 1823-1829
  • J. -W. Ho et al, Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 72009 1476-1488
  • Mauro Conti, Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing, VOL. 8, NO. 5, September/ October2011
  • XiaoAmutihnogr et al, A Replication Detection scheme for Sensor Networks. rPinrogc 0e0d i(a2 E01n1g)i n0e0e0r?in0g0 02 9 2012 21-26
  • Wen Tao Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme. International Conference on Network Computing and Information Security2011
  • Chunming Rong, An Efficient Intrusion Detection Scheme for Wireless Sensor Networks. STA 2011 Workshops, CCIS 187, pp. 116-129, 2011
  • Wang Liu, Kejie Lu et al, Performance Analysis of Wireless Sensor Networks with Mobile Sinks. IEEE Transactions on Vehichular Technology, Vol. XX, No. YY, Month2011
  • Tamara Bonaci et al, Distributed Clone Detection in Wireless Sensor Networks: An Optimization Approach. IEEE2011
  • bf Abu Saleh Md. Tayeen et al, Mobility Assisted Solutions for Well-known Attacks in Mobile Wireless Sensor Network. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 5, May2011
  • Thanh Dai Tran et al, Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks. IEEE Communications Society subject matter experts for publication in the WCNC2010 proceedings
  • Tamara Bonaci et al, Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach. IEEE2010
  • Bin Tong et al, A three-tier framework for intruder information sharing in sensor networks. Ad Hoc Networks 82010 345-360
  • Shigen Shen, A game-theoretic approach for optimizing intrusion detection strategy in WSNs. IEEE2011
  • Abderrezak Rachedi, muDog: Smart Monitoring Mechanism forWireless Sensor Networks based on IEEE 802. 15. 4 MAC. IEEE International Conference on Communications ICC2011 (IEEE ICC'11), Kyoto: Japan2011
  • Noman Mohammed et al, Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing2012
  • Bo Zhu et al, Localized Multicast: Efficient And Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July2010
  • Muhammad Imran et al, A Survey of Simulators, Emulators and Testbeds for Wireless Sensor Networks. IEEE2010
  • Ansgar Kellner et al, Simulation Environments forWireless Sensor Networks. Technical Reports of the Institute of Computer Science at the Georg-August-University at Gottingen, June 2010
  • C. Mallanda et al, Simulating Wireless Sensor Networks with OMNeT++?. LSU Simulator, Version 1,2005
  • Xuedong Xian et al, Comparison of OMNET++ and Other Simulator for WSN Simulation. IEEE2008
  • Klaus Wehrle et al,Modeling and Tools for Network Simulation, Springer-Verlag Berlin Heidelberg 2010
  • Roberto Di Pietro et al, Intrusion-Resilience in Mobile Unattended WSNs. IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM2010proceedings
  • Sooyeon Shin, An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Transactions on Industrial Informatics, Vol. 6, No. 4, November2010
  • P. Samundiswary et al, Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks. . International Journal of Computer and Electrical Engineering, Vol. 2, No. 1, February,2010 1793-8163
  • Mauro Conti, The Quest for Mobility Models to Analyses Security in Mobile Ad Hoc Networks. WWIC 2009, LNCS 5546, pp. 85-96,2009
  • Marjan Kuchaki Rafsanjani et al, Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks. World Applied Sciences Journal 4 ,2008 444-449
  • Patrick Tague et al, Modeling Node Capture Attacks in Wireless Sensor Networks. IEEE2008
  • T. Bonaci et al, A convex optimization approach for clone detection in wireless sensor networks. Pervasive and Mobile Computing2012
  • N. Komninos et al, Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5 2007 289-298
  • T. C. Lam et al, A Mobile Agent Clone Detection System with Itinerary Privacy. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE?02)2002
  • Yingpei Zeng et al, Random-Walk Based Approach to Detect Clone Attacks inWireless Sensor Networks. IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, June2010
  • Chia-Mu Yu et al, CSI: Compressed Sensing-Based Clone Identification in Sensor Networks. 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing2012, Lugarno
  • The IEEE 802. 15. 4 standard (ver. 2006) http://standards. ieee. org/getieee802/ download/802. 15. 4-2006. pdf
  • A. Liu and P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. in Proc. IPSN, Apr. 2008,pp. 245?256.
  • A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks. in Proc. IEEE Int. Conf. Pervasive Comput. Commun. , Mar. 2005, pp. 324-328.
  • P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller,and M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes. in Proc. 2nd ACM Int. Conf. Wirel. SensorNetw. Applicat. ,2003, pp. 151-159.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

wireless sensor network (WSN) clone attack intrusion detection mobility

Powered by PhDFocusTM