Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division

In the matter of detecting clone attacks, we bring in a novel solution called Single Stage Memory Random Walk with Network Division (SSRAND) to circumvent the problems of simple random walk as exploited by both RAND and RAWL protocols. SSRAND combines the single stage memory random walk with network division for clone detection and simulation results verify that it not only reduces the communication and memory costs but also ensures high security of witness nodes with increased detection probability of clones.

[1]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[2]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[3]  Sotiris E. Nikoletseas,et al.  A new random walk for efficient data collection in sensor networks , 2011, MobiWac '11.

[4]  Albert Y. Zomaya,et al.  A framework for real time communication in sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[5]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[6]  Mohamad Naufal bin Mohamad Saad,et al.  Detecting replicated nodes in Wireless Sensor Networks using random walks and network division , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Yang Xiang,et al.  Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[11]  Wazir Zada Khan,et al.  Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[12]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[13]  Mohamad Naufal bin Mohamad Saad,et al.  Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks , 2013, Int. J. Grid Util. Comput..

[14]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[15]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[16]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[18]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[19]  Bhaskar Krishnamachari,et al.  The power of choice in random walks: An empirical study , 2008, Comput. Networks.