본문 바로가기
HOME> 논문 > 논문 검색상세

논문 상세정보

Journal of electrical engineering & technology v.13 no.6, 2018년, pp.2447 - 2455   SCIE
본 등재정보는 저널의 등재정보를 참고하여 보여주는 베타서비스로 정확한 논문의 등재여부는 등재기관에 확인하시기 바랍니다.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

Sujihelen, L.    (Dept. of Computer Science and Engineering, Sathyabama Institute of Science & Technology   ); Jayakumar, C.    (Dept. of Computer Science and Engineering, Sri Venkateswara College of Engineering   ); Senthilsingh, C.    (Dept. of Electronics & Communication Engineering, Adhi College of Engineering  );
  • 초록

    Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.


  • 주제어

    SEC-Secure-Efficient for centralized .   NAK-Novel Alphanumeric Key .   Node replication attacks .   Paillier method .   Secure CLUSTER Election.  

  • 참고문헌 (38)

    1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. "A survey on sensor networks," IEEE Communication, vol. 40, no. 8, pp. 102-114, 2002. 
    2. Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, and Ashok Kumar Turuk, "A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks," Wireless Communications and Mobile Computing, 2017. 
    3. Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, KandemirMT, "On the detection of clones in sensor networks using random key predistribution," IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, vol. 37, no. 6, pp. 1246-1258, 2007. 
    4. L. Sujihelen, C. Jayakumar, C. Senthilsingh, "Detecting Node Replication Attacks in Wireless Sensor Networks Survey," Indian Journal of Science and Technology, 2015, vol. 8, no. 16, 2015. 
    5. Vijayan K, Raaza A, "A novel cluster arrangement energy efficient routing protocol for wireless sensor networks," Indian Journal of Science and Technology, vol. 9, no. 2, 2016. 
    6. Wang Y, Attebury G, Ramamurthy B, "A survey of security issues in wireless sensor networks," IEEE Communications Survey and Tutorials, vol. 8, pp. 1-23, 2006. 
    7. Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang, "Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey," International Journal of Distributed Sensor Networks, vol. 9, no. 5, 2013. 
    8. Znaidi Wassim, Marine Minier, Stephane Ubeda, "Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 9, no. 4, 2013. 
    9. Choi H, Zhu S, La Porta TF, "SET: Detecting node clones in sensor networks," Third International Conference on Security and Privacy in Communications Networks, pp. 17-21, 2007. 
    10. Ko LC, Chen HY, Lin GR, "A neighbor-based detection scheme for wireless sensor networks against node replications attacks," IEEE International Conference on Ultra Modern Telecommunications and Workshop, pp. 1-6, 2009. 
    11. Manjula V., Chellappan C, "The Replication Attack in Wireless Sensor Networks: Analysis and Defenses," Advances in Networks and Communications. Communications in Computer and Information Science, vol. 132, 2011. 
    12. Xing K, Cheng X, Liu F, Du DHC, "Real-time detection of clone attacks in wireless sensor networks," International Conference on Distributed Computing Systems, pp. 3-10, 2008. 
    13. Yu CM, Lu CS, Kuo SY, "CSI: Compressed sensing-based clone identification in sensor networks," IEEE International Conference on Pervasive Computing and Communications, vol. 290, 2012. 
    14. Znaidi M, Ubeda MS, "Hierarchical node replication attacks detection in wireless sensors networks," Proceedings of IEEE Personal, Indoor and Mobile Radio Communications, vol. 82, 2009. 
    15. Y. Zhang & P. Kitsos, "Security in RFID and Sensor Networks," CRC Press, Taylor & Francis Group, chapter 14, pp. 293-320, 2009. 
    16. B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 49-63, May 2005. 
    17. Pantazis, N.A., Nikolidakis, S.A. and Vergados, D.D., "Energy-efficient routing protocols in wireless sensor networks: A survey" IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 551-591, 2013. 
    18. B. Rashid, and M. H. Rehmani, "Applications of wireless sensor networks for urban areas: a survey," Journal of Network and Computer Applications, vol. 60, pp. 192-219, 2016. 
    19. Umer, T., Amjad, M., Afzal, M.K. and Aslam, M., "Hybrid Rapid Response Routing Approach for Delay-Sensitive Data in Hospital Body Area Sensor Network," In Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, 2016 
    20. Xiaodong Song, Xiang Wang, "New Agent -based Proactive Migration Method and System for Big Data Environment(BDE)," Engineering Computations, vol. 32 (8), pp. 2443-2466, 2015. 
    21. Degan Zhang, Guang Li, Ke Zheng,"An energy-balanced routing method based on forward aware factor for Wireless Sensor Network," IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 766-773, 2014. 
    22. Degan Zhang, Xiang Wang, Xiaodong Song, "A Novel Approach to Mapped Correlation of for RFID Anti-collision," IEEE Transactions on Services Computing, vol. 7, no. 4, pp. 741-748, 2014. 
    23. Yanping Liang, "A kind of novel method of service aware computing for uncertain mobile applications," Mathematical and Computer Modeling, vol. 57, no. 3-4, pp. 344-356, 2013. 
    24. Ke Zheng, Ting Zhang,"A Novel Multicast Routing Method with Minimum Transmission for WSN of Cloud Computing Service," Soft Computing, vol. 19, 7, pp. 1817-1827, 2015. 
    25. Xiaodan Zhang, "Design and implementation of embedded uninterruptible power supply system (EUPSS) for webbased mobile application," Enterprise Information Systems, vol. 6, no. 4, pp. 473-489, 2012 
    26. Degan Zhang, "A new approach and system for attentive mobile learning based on seamless migration," Applied Intelligence, vol. 36, no. 1, pp. 75-89, 2012. 
    27. Ke Zheng, Dexin Zhao, "Novel Quick Start (QS) Method for Optimization of TCP," Wireless Networks, vol. 22, no. 1, pp. 211-222, 2016. 
    28. Yannan Zhu, "A new constructing approach for a weighted topology of wireless sensor networks based on local world theory for the Internet of Things (IOT)," Computers & Mathematics with Applications, vol. 64, no. 5, pp. 1044-1055, 2012. 
    29. Xiang Wang, Xiaodong Song, "New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network," Journal of Electrical Engineering & Technology, vol. 10, no. 6, pp. 2384-2392, 2015. 
    30. Song X D, Wang X, "Extended AODV Routing Method Based on Distributed Minimum Transmission (DMT) for WSN," International Journal of Electronics and Communications, vol. 69, no. 1, pp. 371-381, 2015 
    31. X J Kang, "A novel image denoising method based on spherical coordinates system," EURASIP Journal on Advances in Signal Processing, vol. 10, pp. 1-10, 2012. 
    32. Xiang Wang, Xiaodong Song, "New Clustering Routing Method Based on PECE for WSN," EURASIP Journal on Wireless Communications and Networking, vol. 162, pp. 1-13, 2015. 
    33. Zhao C P, "A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network," Computers & Electrical Engineering, vol. 38, no. 3, pp. 694-702, 2012. 
    34. Li W B, "Novel Fusion Computing Method for BioMedical Image of WSN Based on Spherical Coordinate," Journal of Vibro engineering, vol. 18, no. 1, pp. 522-538, 2016. 
    35. Ma Z, "Shadow Detection of Moving Objects Based on Multisource Information in Internet of Things," Journal of Experimental & Theoretical Artificial Intelligence, vol. 29, no. 3, pp. 649-661, 2017. 
    36. Ma Z, "A Novel Compressive Sensing Method Based on SVD Sparse Random Measurement Matrix in Wireless Sensor Network," Engineering Computations, vol. 33, no. 8, pp. 2448-2462, 2016. 
    37. Si Liu, Ting Zhang, "Novel Unequal Clustering Routing Protocol Considering Energy Balancing Based on Network Partition & Distance for Mobile Education," Journal of Network and Computer Applications, vol. 88, no. 15, pp. 1-9, 2017 
    38. Zhou S, Yameng Tang, "A low duty cycle efficient MAC protocol based on self adaption and predictive strategy," Mobile Networks & Applications, 2017. 

 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역

원문보기

무료다운로드
유료다운로드

유료 다운로드의 경우 해당 사이트의 정책에 따라 신규 회원가입, 로그인, 유료 구매 등이 필요할 수 있습니다. 해당 사이트에서 발생하는 귀하의 모든 정보활동은 NDSL의 서비스 정책과 무관합니다.

원문복사신청을 하시면, 일부 해외 인쇄학술지의 경우 외국학술지지원센터(FRIC)에서
무료 원문복사 서비스를 제공합니다.

NDSL에서는 해당 원문을 복사서비스하고 있습니다. 위의 원문복사신청 또는 장바구니 담기를 통하여 원문복사서비스 이용이 가능합니다.

이 논문과 함께 출판된 논문 + 더보기