International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 6 | Year 2013 | Article Id. IJCTT-V4I6P176 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I6P176

A Novel Attack Detection in Wireless Sensor Networks by Using Sequential Probability Ratio Test


S. Udaya Sankar, Dr.K.P.Kaliyamurthie

Citation :

S. Udaya Sankar, Dr.K.P.Kaliyamurthie, "A Novel Attack Detection in Wireless Sensor Networks by Using Sequential Probability Ratio Test," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 6, pp. 1923-1927, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I6P176

Abstract

The main objective of this project is to give security against attacks in the Wireless Sensor Networks (WSNs).One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. Therefore first, the desirable properties of a distributed mechanism for the detection of node Clone attacks have been analyzed. Second, the known solutions for this problem do not completely meet our requirements. In this work, we propose a fast and effective mobile replication node detection scheme using Sequential probability Ratio Test.

Keywords

Sequential Analysis, Replica detection, Wireless sensor network.

References

[1]  Jun-Won Ho, Mathew Wright and Sajal K.Das (2011), „Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing‟, IEEE Transactions on Mobile computing.
[2] J.-Y.L. Boudec and M. Vojnovi_c, “Perfect Simulation and Stationary of a Class of Mobility Models,” Proc. IEEE INFOCOM,pp. 2743-2754, Mar. 2005.pp. 2743-2754, Mar. 2005.
[3] S. Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,”  IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006. 
[4] M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, “A Randomized,  Efficient,  and  Distributed  Protocol  for  the  Detection  of  Node  Replication  Attacks  in  Wireless  Sensor  Networks,”  Proc.  ACM  MobiHoc, pp. 80-89, Sept. 2007. 
[5] K.  Dantu,  M.  Rahimi,  H.  Shah,  S.  Babel,  A.  Dhariwal,  and  G.S.Sukhatme, “Robomote: Enabling Mobility Sensor Networks,”Proc. Fourth IEEE Int‟l Symp. Information Processing in  in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.  [6] J. Ho, M. Wright, and S.K. Das, “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,”Proc.  IEEE INFOCOM, pp. 1773-1781, Apr. 2009. 
[7] J. Ho,  D. Liu,  M.  Wright, and S.K. Das, “Distributed Detection  of  Replicas with Deployment Knowledge in Wireless Sensor Networks, “Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009. 
[8] L. Hu and D. Evans, “Localization for Mobile Sensor Networks,”Proc.  ACM MobiCom, pp. 45-57, Sept. 2004. 
[9] J.Jung,V.   Paxon,   A.W.   Berger,andH.Balakrishnan,“Fast   Portscan  Detection Using Sequential Hypothesis Testing,” Proc.IEEE Symp. Security and Privacy, pp. 211-225, May 2004. 
[10] K. Xing, F. Liu, X. Cheng, and H.C. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks,” Proc. IEEE Int‟l Conf.  Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.