Unique identity and localization based replica node detection in hierarchical wireless sensor networks

Abstract Clustering in Wireless sensor networks (WSN) is a prevalent Hierarchical network management technique. Though disjoint clusters are generally preferred, overlapping clusters find its prominence in some applications of inter-cluster routing, time-synchronization and node localization. Replica node detection is a major challenge in overlapping clusters. This paper aims at replica node detection in overlapping clusters based on two methods, Replica detection based on RFID (RDBRFID) and Replica detection based on Localization techniques (RDBLT). The first method uses RFID for unique node identification and the second method detects replica by identifying its locality based on received signal strength (RSSI) and Triangulation method. These methods are implemented and their performance is compared with Multicast and non clustered methods: Randomized multicast (RM), Line selected multicast (LSM), Fault tolerant virtual back bone tree (FTVBT) and K-coverage WSN. It is observed that RDBRFID exhibits better detection rate and lesser communication overhead due to its deterministic approach.

[1]  Guang Gong,et al.  Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[2]  Mahmood Ahmadi,et al.  Bloom filter applications in network security: A state-of-the-art survey , 2013, Comput. Networks.

[3]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  M Sushma,et al.  INTRUSION DETECTION AND PREVENTION OF NODE REPLICATION ATTACKS IN WIRELESS BODY AREA SENSOR NETWORK , 2012 .

[6]  Sajal K. Das,et al.  Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.

[7]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[8]  Sushil Jajodia,et al.  Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[9]  Lei Guo,et al.  A k-coverage algorithm in three dimensional wireless sensor networks , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).

[10]  K. Suganthi,et al.  Randomized fault-tolerant virtual backbone tree to improve the lifetime of wireless sensor networks , 2015, Comput. Electr. Eng..

[11]  Brian D. O. Anderson,et al.  Wireless sensor network localization techniques , 2007, Comput. Networks.

[12]  V. Biradar RESEARCH ON KEY PRE-DISTRIBUTION SCHEME OF WIRELESS SENSOR NETWORKS , 2013 .

[13]  Dong Hoon Lee,et al.  Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks , 2013, IEEE Systems Journal.

[14]  Ahmed El Oualkadi,et al.  On the performance of adaptive coding schemes for energy efficient and reliable clustered wireless sensor networks , 2017, Ad Hoc Networks.

[15]  Akbar Rahman,et al.  Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[16]  Aduwati Sali,et al.  Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..

[17]  Bingxian Lu,et al.  An Overlapping Clustering Approach for Routing in Wireless Sensor Networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[18]  Ashwini W. Nagpurkar,et al.  An overview of WSN and RFID network integration , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[19]  Decentralized peer-to-peer data dissemination in Wireless Sensor Networks , 2017 .

[20]  Ricardo Simon Carbajo,et al.  Decentralised Peer-to-Peer data dissemination in Wireless Sensor Networks , 2017, Pervasive Mob. Comput..

[21]  S.K. Tripathi,et al.  A scheme for the assignment of unique addresses to support self-organization in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[22]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[23]  Mathieu Cunche,et al.  I know your MAC address: targeted tracking of individual using Wi-Fi , 2014, Journal of Computer Virology and Hacking Techniques.