Detection Of Distributed Sensor Cloning Attacks And Use Of Zero Knowledge Protocol (ZKP) In WSN’s

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - September Issue 2013 by IJCTT Journal
Volume-4 Issue-9                           
Year of Publication : 2013
Authors :Ganesh kumar Reddy Y , Sanjeev Rayadu S , Seshadri U

MLA

Ganesh kumar Reddy Y , Sanjeev Rayadu S , Seshadri U"Detection Of Distributed Sensor Cloning Attacks And Use Of Zero Knowledge Protocol (ZKP) In WSN’s "International Journal of Computer Trends and Technology (IJCTT),V4(9):3335-3339 September Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks.

 

References -
[1] Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks,Proceedings of the 28th International Conference on Distributed Computing Systems, 2008, Pages 3-10.
[2] Nikos Komninos, Dimitris Vergados, Christos Douligeris, DetectingUnauthorized and Compromised Nodes in Mobile AdhocNetworks Journal of Ad Hoc Networks, Volume 5, Issue 3, April2007, Pages: 289-298 .
[3] Klempous Ryszard, Nikodem Jan, Radosz Lukasz, Raus Norbert,Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community Agreement, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based systems, ECBS’2007, 2007, Page(s):153-160.
[4] Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study, TechnicalReport, 2003. http://www.cs.rit.edu/ jsb7384/zkp-survey.pdf
[5] Tuyls, Pim T. (Mol, BE), Murray, Bruce (Eastleigh,GB),Efficient Implementation of Zero Knowledge Protocols,United States NXP B.V. (Eindhoven, NL) 7555646 ,June 2009,http://www.freepatentsonline.com/755 5646.
[6] A. A. Taleb, Dhiraj K. Pradhan and T. Kocak A Technique toIdentify and Substitute Faulty Nodes in Wireless Sensor NetworksProceedings of the 2009 Third International Conference on SensorTechnologies and Applications, 2009, Pages: 346-351
[7] Klempous R.; Nikodem J.; Radosz, L.; Raus, N. ByzantineAlgorithms in Wireless Sensors Network, Wroclaw Univ. of Technol.,Wroclaw; Information and Automation, 2006. ICIA 2006. International Conference on, 15-17 Dec. 2006, pages :319-324
[8] I. Krontiris, Z. Benenson, T. Giannetsos, F. C. Freiling, and T.Dimitriou, Cooperative Intrusion Detection in Wireless Sensor Networks, in Proc. EWSN’09. Berlin, Heidelberg: Springer-Verlag,2009, pp. 263-278.
[9] A. G. Dyachkov and V. V. Rykov., Optimal superimposed codes and designs for Renyis Search Model. Journal of Statistical Planning and Inference, 100(2):281-302, 2002.
[10] A. J. Macula. ,A simple construction of d-disjunct matrices with certain constant weights Discrete Math., 162(13):311-312, 1996.

Keywords :— In-network inference, jamming aware traffic allocation, multipath source routing.