Detection of Clone Attack in Mobile Wireless Sensor Network

Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. We can remove this clone attack by using witness approach algorithm. In the presented paper, four parameters are generated i.e Packet Loss, Packet Delay, Packet Delivery Ratio, Throughput and on the basis of these parameters we conclude that our system gives us better performance.

[1]  Usama Ahmed,et al.  Energy efficient routing protocol for zone based mobile sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[2]  Zhiyun Lin,et al.  A geographically opportunistic routing protocol used in mobile wireless sensor networks , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.

[3]  Priyanka Dubey,et al.  Review of First Hop Redundancy Protocol and Their Functionalities , 2013 .

[4]  Roberto Di Pietro,et al.  Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..

[5]  Shoujun Wang,et al.  Notice of Retraction The design of wireless wave height sensor network node based on Zigbee technology , 2011 .

[6]  Yan Zhang,et al.  The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[7]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[8]  M. P. S Bhatia,et al.  Wireless sensor networks for monitoring the environmental activities , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[9]  Prasanta K. Jana,et al.  A distributed fault-tolerant clustering algorithm for wireless sensor networks , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[10]  Xuhui Chen,et al.  Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.

[11]  P. Thiruvannamalai Sivasankar,et al.  Active key management scheme to avoid clone attack in wireless sensor network , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[12]  Yehuda Lindell,et al.  Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, TCC.

[13]  Pekka Nikander,et al.  Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.

[14]  Sang-Hyun Park,et al.  A study on sensor nodes attestation protocol in a Wireless Sensor Network , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[15]  Adrian Segall,et al.  A multipath routing algorithm for mobile Wireless Sensor Networks , 2010, WMNC2010.