DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network

  • Nagaraj Ambika
  • G. T. Raju
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 115)

Abstract

Wireless sensor network are prone to different types of attacks due to lack of supervision. Trusting the data received from the network becomes quite difficult. Implementing prevention and detection techniques provide strong impediment to the network from getting compromised. In this paper both the techniques are being utilized providing better reliance over the data being communicated. Pair-wise keys and group wise keys are being generated, which also provides identity of the nodes at that instant of time. This technique deters wormhole attack to a large extent.

Keywords

prevention and detection technique steganography group-key generation pair-wise key generation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mainwaring, A., Culler, D., Polastre, J., Polastre, J., Polastre, J.: Wireless Sensor Networks For Habitat Monitoring. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, doi:10.1145/570738.570751Google Scholar
  2. 2.
    Szewczyk, R., Osterweil, E., Polastre, J., Hamilton, M., Hamilton, M., Hamilton, M.: Habitat monitoring with sensor networks. Magazine of Communications of the ACM - Wireless Sensor Networks 47(6) (2004)Google Scholar
  3. 3.
    Naumowicz, T., Freeman, R., Kirk, H., Dean, B., Calsyn, M., Liers, A., Braendle, A., Guilford, T., Schiller, J.: Wireless Sensor Network for habitat monitoring on Skomer Island. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 882–889 (2010), doi:10.1109/LCN.2010.5735827Google Scholar
  4. 4.
    Hefeeda, M., Bagheri, M.: Wireless Sensor Networks for Early Detection of Forest Fires. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, pp. 1–6. Simon Fraser Univ., Surrey (2007), doi:10.1109/MOBHOC.2007.4428702Google Scholar
  5. 5.
    Mal-Sarkar, S., Sikder, I.U., Konangi, V.K.: Application of wireless sensor networks in forest fire detection under uncertainty. In: 13th International Conference on Computer and Information Technology (ICCIT), pp. 193–197 (2010), 10.1109/ICCITECHN.2010.5723853Google Scholar
  6. 6.
    Lee, S.H., Lee, S., Song, H., Lee, H.S.: Wireless sensor network design for tactical military applications: Remote largescale environments. In: Military Communications Conference, pp. 1–7. IEEE (2009), doi:10.1109/MILCOM.2009.5379900Google Scholar
  7. 7.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Commnication 24(2), 370–380 (2005)Google Scholar
  8. 8.
    Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010), doi:10.1109/ICIE.2010.66Google Scholar
  9. 9.
    Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. Journal EURASIP Journal on Wireless Communications and Networking - Special Issue on Wireless Network Algorithms, Systems, and Applications 2010, doi:10.1155/2010/627039Google Scholar
  10. 10.
    Modirkhazeni, A., Aghamahmoodi, S., Modirkhazeni, A., Niknejad, N.: In: The 7th International Conference on Networked Computing (INC), pp. 122–128 (2011)Google Scholar
  11. 11.
    Sharmila, S., Umamaheswari, G.: Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1–6 (2011), doi:10.1109/PACC.2011.5978973Google Scholar
  12. 12.
    Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 526–531 (2008), doi:10.1109/WiMob.2008.83Google Scholar
  13. 13.
    Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Journal Computer Communications 30(11-12) (2007), doi:10.1016/j.comcom.2007.04.025Google Scholar
  14. 14.
    Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. The International Journal of Computer and Telecommunications Networking 53(18) (2009), doi:10.1016/j.comnet.2009.07.013Google Scholar
  15. 15.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses (January 2004)Google Scholar
  16. 16.
    Xiu-Li, R., Wei, Y.: Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4 (2009), doi:10.1109/WICOM.2009.5302573Google Scholar
  17. 17.
    Su, C.-C., Chang, K.-M., Kuo, Y.-H., Horng, M.-F.: The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE Conference on Wireless Communication and Networking, vol. 4, pp. 1927–1932 (2005), doi:10.1109/WCNC.2005.1424814Google Scholar
  18. 18.
    Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 8(1) (2005), doi:10.1145/1053283.1053287Google Scholar
  19. 19.
    Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004), doi:10.1145/1029102.1029111Google Scholar
  20. 20.
    Camtepe, S.A., Yener, B., Yung, M.: Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks. In: IEEE International Conference on Communication, pp. 2262–2267 (2006), doi:10.1109/ICC.2006.255107Google Scholar
  21. 21.
    Sajedi, H., Jamzad, M.: Secure cover selection steganography. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 317–326. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  22. 22.
    Turner, C.: A steganographic computational paradigm for wireless sensor networks. In: International Conference on Innovations and Information Technology, pp. 258–262 (2009), doi:10.1109/IIT.2009.5413637Google Scholar
  23. 23.
    Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)CrossRefGoogle Scholar
  24. 24.
    Chen, C., Song, M., Hsieh, G.: Intrusion detection of Sinkhole attack in largescale wireless sensor network. In: WCNIS 2010, pp. 711–716 (2010)Google Scholar
  25. 25.
    Labraoui, N., Gueroui, M., Aliouat, M.: Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. In: European Transactions on Telecommunications, doi:10.1002/ett.1532Google Scholar
  26. 26.
    Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: WiMob 2008, pp. 526–531 (2008)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Nagaraj Ambika
    • 1
  • G. T. Raju
    • 2
  1. 1.Dayananda Sagar College of EngineeringBharathiar UniversityBangaloreIndia
  2. 2.Dept of CS & EnggRNSITBangaloreIndia

Personalised recommendations