Limit this search to....

A Defense Mechanism Against Clone Wars in Hierarchical Based Wireless Sensor Networks: Clone Wars in Wsn
Contributor(s): , Kamaljit Singh Saini &. Rubal Grewal (Author)
ISBN: 172685566X     ISBN-13: 9781726855662
Publisher: Independently Published
OUR PRICE:   $13.83  
Product Type: Paperback
Published: April 2018
Qty:
Additional Information
BISAC Categories:
- Education | Research
Physical Information: 0.18" H x 8.5" W x 11" (0.53 lbs) 68 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Due to open deployment of sensor nodes in hostile environment and lack of physical shielding, sensor networks are exposed to different types of physical threats including Clone attack where an adversary physically captures a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network. If no specific detection mechanism is employed then the network is vulnerable to many insidious attacks such as signal jamming, insert false information, cluster reformation and network monitoring that challenge the sensor applications.In this thesis, a defense mechanism against replicated nodes is proposed to improve the security of the wireless sensor networks. The scheme is based on the use of location information and identity of each node which is collected by each cluster head from the cluster member nodes. A cluster head maintains a list of all the members present in the cluster including node Id and location. Each cluster head transmits the information (list) to the BS that detects the presence of clone nodes in the network. Thus our proposal is a centralized approach in which central trusted party (BS) is responsible for detection of the clone nodes. The approach also revokes the clone nodes, so that legitimate nodes stops communication with the malicious nods inserted in this manner.The proposed scheme allows the replicated nodes to enter into the network until the location conflict arises. If there is a mismatch occurs in any of the nodes present in the network then the communication with the suspected nodes become blocking mode and raise the revocation procedure by the base station.An analysis has been done on the proposed scheme to measure its effectiveness in the network. The performance of the proposed method is measured by calculating the parameters like detection time and detection probability.