SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
30
Novel Detection Technique for Node Replication Attack in Mobile
Sensor Network
Dr. BABUKARUPPIAH1
, JEYALAKSHMI.V2
, PRADEEPA.N3
, VINOTHA.R4
1
Assistant Professor, 2,3,4
Under Graduates of Electronics and Communication Engineering
Velammal College of Engineering and Technology Madurai
ABSTRACT- A Wireless Sensor Network (WSN)
consists of a number of ultra small, autonomous
and resource-constrained sensor nodes, but is
often deployed in unattended and harsh
environments to perform various monitoring
tasks. The WSN is vulnerable to security threats
and susceptible to physical capture. Thus, it is
necessary to use effective mechanisms to protect
the network. This paper considers a typical
threat in the latter category known as the node
replication attack, where an adversary prepares
own low-cost sensor nodes and deceives the
network into accepting them as legitimate ones.
The technique used in static networks to find the
replicated nodes cannot apply to the mobile
sensor networks because the location of the node
is not stable in a network. Only few techniques
are proposed for mobile sensor networks. In
existing method to detect node replication attack
many beacon signal are sent which is costly and
not accurate .In this paper replicated nodes are
detected by cluster head using their velocity by
encryption and decryption techniques. The
advantages of our proposed algorithm include 1)
Accuracy 2) Efficiency 3) Reduces energy
Consumption.
1. INTRODUCTION
A. Wireless Sensor Networks
The Wireless sensor network is built of nodes
from a few to several hundreds or even thousands,
where each node is connected to one or sometimes
several sensors. Each such sensor network node has
typically several parts: a radio transceiver with an
internal antenna or connection to an external
antenna, a microcontroller, an electronic circuit for
interfacing with the sensors and an energy source,
usually a battery or an embedded form of energy
harvesting.
B. Security Attacks in Wireless Sensor Network
The WSN has many different types of attacks
Flooding attack: Flooding attack is a type of
denial of service attack in which the attacker send a
large number of packets to the target node their by
discontinues their communication in the network.
Jamming attack: In jamming attack, an
electromagnetic interference is caused in the
frequency of the network operations and also in the
targeted receiver so that the transmitted message is
corrupted.
Replay Attack: A replay attack is caused when the
transmitted data is maliciously replayed. It is
caused either by the originated. The forwarded
packets are copied and repeatedly transmitted to the
targeted node by the attacker
Spoofing Attack: in spoofing attack, the routing
loop is created and the routing information are
attracted and replayed so as to complicate the
network by the adversary.
Sinkhole Attack: In the sinkhole attack, the base
station is prevented from getting the information
regarding the sensing data. It draws the attention of
the network traffic by just advertising them as the
trusted node or as the shortest path.
C. Node Replication Attack
Node replication attack is also known as clone
attack. It exists in both the static and mobile
Wireless sensor network. It creates an extensive
harm to the network because the replicated node
also has the same identity as the legitimate
member. It is difficult to detect the replicated node
in mobile sensor network since the location can
vary from time to time. Node replication is done by
adversary by compromising one sensor node and
fabricates many replicas having the same identity
from the captured node.
Fig 1.1 Node replication attack
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
31
Fig 1.1 show the node replication attack where
the attacker collecting information from genuine
node to create a low cost replicated node
It is desirable but very challenging to have
efficient and effective distributed algorithms for
detecting replicas in mobile sensor network.
D. Related Works
In mobile sensor networks many works are
existing for node replication attack. In those papers
they had discussed about the 1) Witness finding
strategy 2) Setting threshold value 3) Detecting the
nodes with same identity [1], which consume more
energy, time and accuracy is less it cannot find the
replicated node but it will identify the replicated
and genuine node. So the data for both the node
will be blocked. They send both the location and
the signature ({L (v), sig (L (v))} where L (v) is the
location of v, sig (L (v)) is the signature of v) to
their neighbouring nodes which consume more
energy and time to detect the replicated node.
Sometimes the replication is not found in large
networks. Clusters are formed only for stationary
network [11] which will be more efficient for
mobile sensor network. They found the replication
only in a particular range [16] which cannot be
used in mobile sensor network. A threshold value is
set for all nodes to communicate with each other
but some time the genuine node may have the
necessary to communicate above the threshold so
the accuracy is less [2].The witness-finding strategy
exploits the fact that one sensor node cannot appear
at different locations, but, unfortunately, the sensor
nodes in mobile sensor networks have the
possibility of appearing at different locations at
different times, so the schemes in static wireless
sensor networks cannot be directly applied to
mobile sensor networks. Slight modification of
these schemes can be helpful for applicability to
mobile sensor networks. For instance, the witness-
finding strategy can adapt to mobile environments
if a timestamp is associated with each location
claim. In addition, setting a fixed time window in
advance and performing the witness-finding
strategy for every units of time can also keep
witness-finding feasible in mobile sensor networks.
Nevertheless, accurate time synchronization among
all the nodes in the network is necessary.
Moreover, when witness-finding is applied to
mobile sensor networks, routing the message to the
witnesses incurs even higher communication cost.
After identifying the replicas, a message used to
revoke the replicas, possibly issued by the base
station or the witness that detects the replicas, is
usually flooded throughout the network.
Nevertheless, network-wide broadcast is highly
energy consuming and, therefore, should be
avoided in the protocol design. Time
synchronization is needed. Nevertheless, it is still a
challenging task to synchronize the time of nodes
in the network, even though loose time
synchronization is sufficient for the detection
purpose. Hence, as we know that time
synchronization algorithms currently need to be
performed periodically to synchronize the time of
each node in the network, thereby incurring
tremendous overhead, it would be desirable to
remove this requirement. Witness-finding could be
categorized as a strategy of cooper active detection;
sensor nodes collaborate in certain ways to
determine which ones are the replicas. In this
regard, the effectiveness of witness-finding could
be reduced when a large number of sensor nodes
have been compromised, because the compromised
nodes can block the message issued by the nodes
near the replicas. Hence, the witness nodes cannot
discover the existence of replicas. The
effectiveness in detecting replicas, all of the
schemes adopting witness-finding have the
common drawback that the detection period cannot
be determined. In other words, the replica detection
algorithm can be triggered to identify the replicas
only after the network anomaly has been noticed by
the network planner. Therefore, a detection
algorithm that can always automatically detect the
replica is desirable. Since the existing algorithms
are built upon several other requirements, we have
found that the common weakness of the existing
protocols in detecting node replication attacks is
that a large amount of communication cost is still
unavoidable [1].
The node replication attack in mobile sensor
nodes are detected by two methods
1. Centralized Detection
In mobile sensor networks there is only one
centralized detection method called Sequential
Probability Ratio Test (SPRT).
1.1 Sequential Probability Ratio Test: In SPRT
[3], each and every time the node claims its
location and time information to their neighbours
and they forward it to the base station when they
enter into a new location.
1.2 Straight Forward Scheme: In straight forward
scheme [4] each node has to send a list of its
neighbours and the positions claimed by these
neighbours to the base station, which then
examines every neighbour list to look for replicated
sensor nodes. In a stationary WSN, conflicting
position claims for one node id indicates a
replication. Once the base station spots one or more
DETECTION METHODS
CENTRALIZED
DETECTION
DISTRIBUTED
DETECTION
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
32
replicas, it can revoke the replicated nodes by
flooding the network with an authenticated
revocation message.
1.3 Fingerprint Verification: This scheme
consists of two phases [6]. In the first phase, each
node u computes for each neighbour v ϵ N (u) the
fingerprint FPv, which is a reflection of v‟s fixed
neighbourhood characteristics; node v itself is also
capable of computing FPv. In the second phase, the
legitimacy of the originator for each message is
verified by checking the enclosed fingerprint, and
the detection is conducted both „„at the sensor
side‟‟ (seemingly in a distributed manner by the
notion) and at the base station. However, even the
detection „„at the sensor side‟‟ needs the base
station to process the alarms for decision making,
and thus the scheme is throughout centralized.
1.4 Detecting Cloned Keys: It assumptions and
application scenarios are quit different from other
approaches in fact it addresses the detection of
cloned cryptographic keys rather than cloned
sensor nodes and falls into the category of anomaly
detection [2]. The basic idea is that in the context
of random key pre-distribution the keys employed
by genuine nodes should follow a certain pattern.
Therefore it is possible to monitor the key usage as
authentication tokens and then detect statistical
deviations that indicate clone attack. the approach
detects the cloned keys by node authentication
statistics those keys whose usage exceeds a certain
threshold are considered cloned and erased from
the network.
1.5 Set operation: SET logically partitions[11] the
network into non overlapping regions respectively
managed by leaders, and has these leaders
respectively report to the base station all the ids of
the nodes in the region, in the form of the subset.
Intuitively, the “Intersection” of any two subsets of
reports should be empty; otherwise, replication is
detected
2. Distributed Detection
There are two distributed detection methods
they are eXtremely Efficient Detection (XED) and
Efficient and Distributed Detection (EDD) [1]
2.1 Extremely Efficient Detection: XED has two
steps Offline and Online step
2.1.1 Offline Step: It has a security parameter b
and a cryptographic hash function h(.) are stored in
each node. Two arrays of length n which keep the
received random number and the materials used to
check the legitimacy of received random number.
Two arrays are initialized to zero vectors.
B (u) - Initialized to be empty.
2.1.2 Online step: When two nodes u & v meet for
first time it exchanges a random number. When v
attempts to communicate with u next time, v should
send the random number given by u during first
meet. Then u check the random number given by v
if the verification fails v will be blacklisted by u. If
verification is success communication will be
extended between u & v.
The effectiveness of XED, unfortunately, heavily
relies on the assumption that the replicas do not
collude with each other. When replicas can
communicate with each other, the replica can
always share the newest received random numbers
with the other neighbouring replicas, thus
degrading the detection capability because multiple
replicas are able to reply with the correct random
number to encountered genuine nodes accordingly.
2.2 Efficient and Distributed Detection: EDD has
two steps offline and online steps
2.2.1 Offline step: In the network without replicas,
the number of times a node meets a specific node
should be limited for a given time interval.
2.2.2 Online step: In the network with replicas, the
number of times a node meets a particular node
should be greater than the threshold.
Since the effectiveness of EDD relies on the
fact that each node faithfully and periodically
broadcasts its ID, a strategy called selective silence
could be taken by the replicas to compromise the
detection capability of EDD.
3. PROPOSED WORK
Assumed that sensor network consist of n
node with node ID {1, 2, 3..., n}.The nodes are
assumed to move with a constant velocity for a
particular distance and then remain stationary for
specified time. More over the nodes are assumed to
communicate only during stationary period. The
nodes are allowed to move randomly. The network
is divided into clusters which are monitored by the
respective cluster head. The cluster head maintain
the data base which contain node ID, velocity and
key for each node. The initial velocity of each node
is encrypted with a key and stored as a packet in
that particular node. Whenever a node enters into a
cluster it should send its node id to the cluster head.
This paper consists of two scenarios.
1. Replication inside a cluster
2. Replication in different cluster
3.1 Replication inside a cluster: when a node
enter into a cluster it should give its id to the cluster
head the cluster head will check for the reputation
of that id in that cluster if there is some other node
inside that particular cluster then the cluster will
send a packet to those two node with the same id.
That packet asks for the encrypted velocity from
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
33
those two nodes. The node will send the packet
with the encrypted velocity when this packet reach
the cluster head it will decrypt the packet and check
the velocity with its database. The node with
different velocity is identified as replicated node.
The request from replicated node is avoided and the
replication is broadcasted to all cluster heads. So
the replicated node cannot get any information
from the network.
Fig 3.1 shows the replication inside the
cluster. The data base has the velocity as V1 for
node 1 so the request from new node is denied.
Fig 3.1 Node Replication Inside A Cluster
3.2 Replication in different cluster: : when a
node enter into a cluster it should give its id to the
cluster head the cluster head will check for the
reputation of that id in that cluster if there is some
other node inside that particular cluster. When there
is no reputation in the same cluster the particular
cluster head will intersect the data base of other
cluster head to identify reputation. If there is
reputation the cluster will send a packet to those
two node with the same id. That packet asks for the
encrypted velocity from those two nodes. The
node will send the packet with the encrypted
velocity when this packet reach the cluster head it
will decrypt the packet and check the velocity by
intersecting the database. The node with different
velocity is identified as replicated node. The
request from replicated node is avoided and the
replication is broadcasted to all cluster heads. So
the replicated node cannot get any information
from the network.
Fig 3.2 Node Replication On Different Cluster
Fig 3.2 Show the replication in different
cluster. The Node with id 1 send request to the
cluster A. The cluster A does not have any node
with node id 1 so it intersect the database with
other clusters the cluster head B has a node with
node id 1. After verification the request from
replicated node is denied
4. SIMULATION RESULTS
The proposed work is implemented using
Network Simulator 2.The proposed work increased
the energy efficiency and reduces the packet drop.
In the existing work node id and location are
broadcasted to neighbours and when a node get
same id with different location it is found to be
replicated with take more energy and time. To
overcome this proposed work formed clusters with
a cluster head this increases the energy efficiency.
When the neighbour nodes get the details it will
take time to find the replication if the replicated
node and genuine nodes are far away. In the
proposed work cluster head alone used to find the
replica the time taken is so less. When the
replicated node enters a cluster its genuinely is
identified so the packet drop is not found the packet
is forwarded only to the genuine node. The
accuracy of finding the replicated node is high.
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
34
Fig 4.1 Energy Efficiency Graph
In the graph the X axis shows no of nodes and
Y axis shows energy efficiency. Green line shows
the energy efficiency of the proposed work and the
red line shows the efficiency of existing method.
When the number of node increase the efficiency
goes down in existing work. In the proposed work
the efficiency level is high compared with previous
works. The increase in efficiency is due to the
formation of cluster the node id is send only to
cluster head in existing work the location and id is
send to neighbours and the nodes are used to find
the replication in the network.
Fig 4.2 Packet Drop Graph
In the above graph the X axis shows the time
and the Y axis shows the packet drop. The red line
shows the packet drops in existing work and the
green line shows the packet drop in proposed work.
Since the nodes are verified before entering the
cluster which avoid packet drop. As the packet
drop become less the packet delivery ratio become
high which is shown in the Fig 4.3
Fig 4.3 Packet Delivery Ratio Graph
In the graph X axis shows number of
connection and Y axis shows packet delivery ratio.
The green line shows the packet delivery ratio of
proposed work and the red line shows the packet
delivery ratio of existing work. The packet delivery
ratio is high for the proposed work.
5. CONCLUSION
In the proposed work formation of cluster and
detecting replication is the main work. In the first
method replication inside the cluster alone is found
in order to improve the accuracy second method is
proposed which is used to find the replication in
different cluster too. The proposed work increased
the efficiency and accuracy in finding node
replication attack.
REFERENCES
1. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu,
Member, IEEE, and Sy-Yen Kuo, on “Localized
Algorithms for Detection of Node Replication
Attacks in Mobile Sensor Network” IEEE
transactions on information forensics and
security, vol. 8, no. 5, may 2013
2. R. Brooks, P. Y. Govindaraju, M. Pirretti, N.
Vijaykrishnan, and M. T. Kandemir, “On the
Detection of Clones in Sensor Networks using
Random Key Predistribution,” IEEE Trans.
Syst., Man, Cybern. C, Ap- plicat. Rev., vol. 37,
no. 6, pp. 1246–1258, Nov. 2007.
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
35
3. Ho J-W, Liu D, Wright M, Das SK. on
“Distributed Detection of Replica Node Attacks
with Group Deployment Knowledge in
Wireless Sensor Networks, Ad Hoc Network”
2009;7(November): 1476-88.
4. Parno B, Perrig A, Gligor V.Distributed
detection of node replication attacks in sensor
networks In: proceedings of the 26th
IEEE
symposium on security and privacy;2005
5. Poovendran R, Wang C, Roy S. Secure
Localization and Time Synchronization for
Wireless Sensor and Ad hoc Networks.New
York Inc: Springer-Verlag; 2007.
6. Xing K, Liu F, Cheng X, Du DHC, Real time
detection of clone attacks in wireless sensor
networks. In: proceedings of the 28th
international conference on distributed
computing systems 2008.
7. Li Z, Gong G. DHT-Based Detection of Node
Clone in Wireless Sensor Networks.
In:Proceedings of the 1st international
conference on ad hoc networks
(ADHOCNETS‟09); 2009b. p. 240–55
8. Zhang Q, Yu T, Ning P. A framework for
Identifying Compromised Nodes in Wireless
Sensor Networks. ACM Transactions on
Information and Systems Security 2008;
11(March): 12:1–37. September
9. Zhu WT, Zhou J, Deng R, Bao F. Detecting
Node Replication Attacks in Mobile Sensor
Networks: theory and approaches. Security and
Communication Networks, available online
May 2011.
10. Zhang M, Khanapure V, Chen S, Xiao X.
Memory Efficient Protocols for Detecting Node
Replication Attacks in Wireless Sensor
Networks. In: Proceedings of the 17th IEEE
international conference on network protocols
(ICNP‟09); 2009. p. 284–93. October
11. Wen Tao Zhu, Jianying, Robert H.Deng,
FengBao on Detecting Node Replication
Attacks in Wireless Sensor Networks Journal of
network and computer application 35(2012)
12. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo,
“Noninteractive pairwise key es- tablishment
for sensor networks,” IEEE Trans. Inf.Forensics
Security, vol. 5, no. 3, pp. 556–569, Sep. 2010.
13. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An
interleaved hop-by-hop authentication scheme
for filtering false data in sensor networks,” in
Proc. IEEE Symp. Security and Privacy (S&P),
Oakland, CA, USA, 2004, pp. 259–271.
14. D. B. Johnson and D. A. Maltz, “Dynamic
source routing in ad hoc wireless networks,”
Mobile Comput., pp. 153–181, 1996
15. J. Yi, J. Koo, and H. Cha, “A localization
technique for mobile sensor networks using
archived anchor information,” in Proc. IEEE
Conf. Sensor, Mesh, and Ad Hoc
Communications and Networks (SECON),
California, USA, 2008, pp. 64–72.
16. Huang Jian, Xiong Yan, Li Ming-Xi, Miao Fu
You, “A Range- based detection method of
replication attacks in wireless sensor networks”.
International Conference on Information and
computer networks,2012.

More Related Content

What's hot

Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNIJTET Journal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 

What's hot (18)

C0511318
C0511318C0511318
C0511318
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
A1803060110
A1803060110A1803060110
A1803060110
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 

Viewers also liked

Eat Healthy & Live Long
Eat Healthy & Live Long Eat Healthy & Live Long
Eat Healthy & Live Long Andrew Barnett
 
Iisrt vincent raj (mech)
Iisrt vincent raj (mech)Iisrt vincent raj (mech)
Iisrt vincent raj (mech)IISRT
 
Andrew Barnett: Exercise. Simply.
Andrew Barnett: Exercise. Simply.Andrew Barnett: Exercise. Simply.
Andrew Barnett: Exercise. Simply.Andrew Barnett
 
QM - Inspection during Goods receipt
QM - Inspection during Goods receipt QM - Inspection during Goods receipt
QM - Inspection during Goods receipt Metaphor Consulting
 
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...Global Water Initiative - West Africa
 
06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger
06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger
06 - Procédure de sécurisation foncière d'un périmètre irrigué au NigerGlobal Water Initiative - West Africa
 
Communication de l'ONAHA sur l'évolution des travaux d'immatriculation
Communication de l'ONAHA sur l'évolution des travaux d'immatriculationCommunication de l'ONAHA sur l'évolution des travaux d'immatriculation
Communication de l'ONAHA sur l'évolution des travaux d'immatriculationGlobal Water Initiative - West Africa
 
Iisrt akshata ht
Iisrt akshata htIisrt akshata ht
Iisrt akshata htIISRT
 
10 Celebrities With Caribbean Roots
10 Celebrities With Caribbean Roots10 Celebrities With Caribbean Roots
10 Celebrities With Caribbean RootsCarib Social WIRE
 
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...Global Water Initiative - West Africa
 
Sécurisation foncière des exploitations familiales dans les grands périmètres...
Sécurisation foncière des exploitations familiales dans les grands périmètres...Sécurisation foncière des exploitations familiales dans les grands périmètres...
Sécurisation foncière des exploitations familiales dans les grands périmètres...Global Water Initiative - West Africa
 
Iisrt sinthuja mepco (ec)
Iisrt sinthuja mepco (ec)Iisrt sinthuja mepco (ec)
Iisrt sinthuja mepco (ec)IISRT
 

Viewers also liked (19)

Drivers education
Drivers educationDrivers education
Drivers education
 
Ohio driving school
Ohio driving schoolOhio driving school
Ohio driving school
 
Driving school ohio
Driving school ohioDriving school ohio
Driving school ohio
 
Eat Healthy & Live Long
Eat Healthy & Live Long Eat Healthy & Live Long
Eat Healthy & Live Long
 
Iisrt vincent raj (mech)
Iisrt vincent raj (mech)Iisrt vincent raj (mech)
Iisrt vincent raj (mech)
 
Andrew Barnett: Exercise. Simply.
Andrew Barnett: Exercise. Simply.Andrew Barnett: Exercise. Simply.
Andrew Barnett: Exercise. Simply.
 
01 - Le régime juridique des terres aménagées au Niger
01 - Le régime juridique des terres aménagées au Niger01 - Le régime juridique des terres aménagées au Niger
01 - Le régime juridique des terres aménagées au Niger
 
QM - Inspection during Goods receipt
QM - Inspection during Goods receipt QM - Inspection during Goods receipt
QM - Inspection during Goods receipt
 
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...
Etude comparative de la valeur actuelle des barrages de Niandouba et Confluen...
 
Driver education course Ohio
Driver education course OhioDriver education course Ohio
Driver education course Ohio
 
Workshop - Cordova e Ionic
Workshop - Cordova e IonicWorkshop - Cordova e Ionic
Workshop - Cordova e Ionic
 
06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger
06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger
06 - Procédure de sécurisation foncière d'un périmètre irrigué au Niger
 
Industrial Boltless Shelving
Industrial Boltless ShelvingIndustrial Boltless Shelving
Industrial Boltless Shelving
 
Communication de l'ONAHA sur l'évolution des travaux d'immatriculation
Communication de l'ONAHA sur l'évolution des travaux d'immatriculationCommunication de l'ONAHA sur l'évolution des travaux d'immatriculation
Communication de l'ONAHA sur l'évolution des travaux d'immatriculation
 
Iisrt akshata ht
Iisrt akshata htIisrt akshata ht
Iisrt akshata ht
 
10 Celebrities With Caribbean Roots
10 Celebrities With Caribbean Roots10 Celebrities With Caribbean Roots
10 Celebrities With Caribbean Roots
 
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...
Les enjeux de la mise à jour de la situation foncière et les nouveaux outils ...
 
Sécurisation foncière des exploitations familiales dans les grands périmètres...
Sécurisation foncière des exploitations familiales dans les grands périmètres...Sécurisation foncière des exploitations familiales dans les grands périmètres...
Sécurisation foncière des exploitations familiales dans les grands périmètres...
 
Iisrt sinthuja mepco (ec)
Iisrt sinthuja mepco (ec)Iisrt sinthuja mepco (ec)
Iisrt sinthuja mepco (ec)
 

Similar to Node detection technique for node replication attack in mobile sensor network

Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 

Similar to Node detection technique for node replication attack in mobile sensor network (20)

D0952126
D0952126D0952126
D0952126
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
D0961927
D0961927D0961927
D0961927
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 

More from IISRT

Iisrt z mahantaesh tr
Iisrt z mahantaesh trIisrt z mahantaesh tr
Iisrt z mahantaesh trIISRT
 
Iisrt z abhijit devaraj
Iisrt z abhijit devarajIisrt z abhijit devaraj
Iisrt z abhijit devarajIISRT
 
Iisrt sohan sontakke
Iisrt sohan sontakkeIisrt sohan sontakke
Iisrt sohan sontakkeIISRT
 
Iisrt saravana kumar
Iisrt saravana kumarIisrt saravana kumar
Iisrt saravana kumarIISRT
 
Iisrt karthik subramanian
Iisrt karthik subramanianIisrt karthik subramanian
Iisrt karthik subramanianIISRT
 
Iisrt seedha devi (networks)
Iisrt seedha devi (networks)Iisrt seedha devi (networks)
Iisrt seedha devi (networks)IISRT
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)IISRT
 
Iisrt sibi kumar (mech)
Iisrt sibi kumar (mech)Iisrt sibi kumar (mech)
Iisrt sibi kumar (mech)IISRT
 
Iisrt settu ravichandran (civil)
Iisrt settu ravichandran (civil)Iisrt settu ravichandran (civil)
Iisrt settu ravichandran (civil)IISRT
 
Iisrt prithvi elango (civil)
Iisrt prithvi elango (civil)Iisrt prithvi elango (civil)
Iisrt prithvi elango (civil)IISRT
 
Iisrt khalid ahmed gour (civil)
Iisrt khalid ahmed gour (civil)Iisrt khalid ahmed gour (civil)
Iisrt khalid ahmed gour (civil)IISRT
 
Iisrt siddharth prabhu (electrical)
Iisrt siddharth prabhu (electrical)Iisrt siddharth prabhu (electrical)
Iisrt siddharth prabhu (electrical)IISRT
 
Iisrt shiny navya (electrical)
Iisrt shiny navya (electrical)Iisrt shiny navya (electrical)
Iisrt shiny navya (electrical)IISRT
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)IISRT
 
Iisrt anjana francis (ec)
Iisrt anjana francis (ec)Iisrt anjana francis (ec)
Iisrt anjana francis (ec)IISRT
 
Iisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatuaIisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatuaIISRT
 
Iisrt zz srikiran rao
Iisrt zz srikiran raoIisrt zz srikiran rao
Iisrt zz srikiran raoIISRT
 

More from IISRT (20)

Iisrt z mahantaesh tr
Iisrt z mahantaesh trIisrt z mahantaesh tr
Iisrt z mahantaesh tr
 
Iisrt z abhijit devaraj
Iisrt z abhijit devarajIisrt z abhijit devaraj
Iisrt z abhijit devaraj
 
Iisrt sohan sontakke
Iisrt sohan sontakkeIisrt sohan sontakke
Iisrt sohan sontakke
 
Iisrt saravana kumar
Iisrt saravana kumarIisrt saravana kumar
Iisrt saravana kumar
 
Iisrt karthik subramanian
Iisrt karthik subramanianIisrt karthik subramanian
Iisrt karthik subramanian
 
Iisrt seedha devi (networks)
Iisrt seedha devi (networks)Iisrt seedha devi (networks)
Iisrt seedha devi (networks)
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
Iisrt sibi kumar (mech)
Iisrt sibi kumar (mech)Iisrt sibi kumar (mech)
Iisrt sibi kumar (mech)
 
Iisrt settu ravichandran (civil)
Iisrt settu ravichandran (civil)Iisrt settu ravichandran (civil)
Iisrt settu ravichandran (civil)
 
Iisrt prithvi elango (civil)
Iisrt prithvi elango (civil)Iisrt prithvi elango (civil)
Iisrt prithvi elango (civil)
 
Iisrt khalid ahmed gour (civil)
Iisrt khalid ahmed gour (civil)Iisrt khalid ahmed gour (civil)
Iisrt khalid ahmed gour (civil)
 
Iisrt siddharth prabhu (electrical)
Iisrt siddharth prabhu (electrical)Iisrt siddharth prabhu (electrical)
Iisrt siddharth prabhu (electrical)
 
Iisrt shiny navya (electrical)
Iisrt shiny navya (electrical)Iisrt shiny navya (electrical)
Iisrt shiny navya (electrical)
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
Iisrt anjana francis (ec)
Iisrt anjana francis (ec)Iisrt anjana francis (ec)
Iisrt anjana francis (ec)
 
Iisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatuaIisrt zzz satyabrata khatua
Iisrt zzz satyabrata khatua
 
Iisrt zz srikiran rao
Iisrt zz srikiran raoIisrt zz srikiran rao
Iisrt zz srikiran rao
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Node detection technique for node replication attack in mobile sensor network

  • 1. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 30 Novel Detection Technique for Node Replication Attack in Mobile Sensor Network Dr. BABUKARUPPIAH1 , JEYALAKSHMI.V2 , PRADEEPA.N3 , VINOTHA.R4 1 Assistant Professor, 2,3,4 Under Graduates of Electronics and Communication Engineering Velammal College of Engineering and Technology Madurai ABSTRACT- A Wireless Sensor Network (WSN) consists of a number of ultra small, autonomous and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. This paper considers a typical threat in the latter category known as the node replication attack, where an adversary prepares own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. The technique used in static networks to find the replicated nodes cannot apply to the mobile sensor networks because the location of the node is not stable in a network. Only few techniques are proposed for mobile sensor networks. In existing method to detect node replication attack many beacon signal are sent which is costly and not accurate .In this paper replicated nodes are detected by cluster head using their velocity by encryption and decryption techniques. The advantages of our proposed algorithm include 1) Accuracy 2) Efficiency 3) Reduces energy Consumption. 1. INTRODUCTION A. Wireless Sensor Networks The Wireless sensor network is built of nodes from a few to several hundreds or even thousands, where each node is connected to one or sometimes several sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. B. Security Attacks in Wireless Sensor Network The WSN has many different types of attacks Flooding attack: Flooding attack is a type of denial of service attack in which the attacker send a large number of packets to the target node their by discontinues their communication in the network. Jamming attack: In jamming attack, an electromagnetic interference is caused in the frequency of the network operations and also in the targeted receiver so that the transmitted message is corrupted. Replay Attack: A replay attack is caused when the transmitted data is maliciously replayed. It is caused either by the originated. The forwarded packets are copied and repeatedly transmitted to the targeted node by the attacker Spoofing Attack: in spoofing attack, the routing loop is created and the routing information are attracted and replayed so as to complicate the network by the adversary. Sinkhole Attack: In the sinkhole attack, the base station is prevented from getting the information regarding the sensing data. It draws the attention of the network traffic by just advertising them as the trusted node or as the shortest path. C. Node Replication Attack Node replication attack is also known as clone attack. It exists in both the static and mobile Wireless sensor network. It creates an extensive harm to the network because the replicated node also has the same identity as the legitimate member. It is difficult to detect the replicated node in mobile sensor network since the location can vary from time to time. Node replication is done by adversary by compromising one sensor node and fabricates many replicas having the same identity from the captured node. Fig 1.1 Node replication attack
  • 2. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 31 Fig 1.1 show the node replication attack where the attacker collecting information from genuine node to create a low cost replicated node It is desirable but very challenging to have efficient and effective distributed algorithms for detecting replicas in mobile sensor network. D. Related Works In mobile sensor networks many works are existing for node replication attack. In those papers they had discussed about the 1) Witness finding strategy 2) Setting threshold value 3) Detecting the nodes with same identity [1], which consume more energy, time and accuracy is less it cannot find the replicated node but it will identify the replicated and genuine node. So the data for both the node will be blocked. They send both the location and the signature ({L (v), sig (L (v))} where L (v) is the location of v, sig (L (v)) is the signature of v) to their neighbouring nodes which consume more energy and time to detect the replicated node. Sometimes the replication is not found in large networks. Clusters are formed only for stationary network [11] which will be more efficient for mobile sensor network. They found the replication only in a particular range [16] which cannot be used in mobile sensor network. A threshold value is set for all nodes to communicate with each other but some time the genuine node may have the necessary to communicate above the threshold so the accuracy is less [2].The witness-finding strategy exploits the fact that one sensor node cannot appear at different locations, but, unfortunately, the sensor nodes in mobile sensor networks have the possibility of appearing at different locations at different times, so the schemes in static wireless sensor networks cannot be directly applied to mobile sensor networks. Slight modification of these schemes can be helpful for applicability to mobile sensor networks. For instance, the witness- finding strategy can adapt to mobile environments if a timestamp is associated with each location claim. In addition, setting a fixed time window in advance and performing the witness-finding strategy for every units of time can also keep witness-finding feasible in mobile sensor networks. Nevertheless, accurate time synchronization among all the nodes in the network is necessary. Moreover, when witness-finding is applied to mobile sensor networks, routing the message to the witnesses incurs even higher communication cost. After identifying the replicas, a message used to revoke the replicas, possibly issued by the base station or the witness that detects the replicas, is usually flooded throughout the network. Nevertheless, network-wide broadcast is highly energy consuming and, therefore, should be avoided in the protocol design. Time synchronization is needed. Nevertheless, it is still a challenging task to synchronize the time of nodes in the network, even though loose time synchronization is sufficient for the detection purpose. Hence, as we know that time synchronization algorithms currently need to be performed periodically to synchronize the time of each node in the network, thereby incurring tremendous overhead, it would be desirable to remove this requirement. Witness-finding could be categorized as a strategy of cooper active detection; sensor nodes collaborate in certain ways to determine which ones are the replicas. In this regard, the effectiveness of witness-finding could be reduced when a large number of sensor nodes have been compromised, because the compromised nodes can block the message issued by the nodes near the replicas. Hence, the witness nodes cannot discover the existence of replicas. The effectiveness in detecting replicas, all of the schemes adopting witness-finding have the common drawback that the detection period cannot be determined. In other words, the replica detection algorithm can be triggered to identify the replicas only after the network anomaly has been noticed by the network planner. Therefore, a detection algorithm that can always automatically detect the replica is desirable. Since the existing algorithms are built upon several other requirements, we have found that the common weakness of the existing protocols in detecting node replication attacks is that a large amount of communication cost is still unavoidable [1]. The node replication attack in mobile sensor nodes are detected by two methods 1. Centralized Detection In mobile sensor networks there is only one centralized detection method called Sequential Probability Ratio Test (SPRT). 1.1 Sequential Probability Ratio Test: In SPRT [3], each and every time the node claims its location and time information to their neighbours and they forward it to the base station when they enter into a new location. 1.2 Straight Forward Scheme: In straight forward scheme [4] each node has to send a list of its neighbours and the positions claimed by these neighbours to the base station, which then examines every neighbour list to look for replicated sensor nodes. In a stationary WSN, conflicting position claims for one node id indicates a replication. Once the base station spots one or more DETECTION METHODS CENTRALIZED DETECTION DISTRIBUTED DETECTION
  • 3. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 32 replicas, it can revoke the replicated nodes by flooding the network with an authenticated revocation message. 1.3 Fingerprint Verification: This scheme consists of two phases [6]. In the first phase, each node u computes for each neighbour v ϵ N (u) the fingerprint FPv, which is a reflection of v‟s fixed neighbourhood characteristics; node v itself is also capable of computing FPv. In the second phase, the legitimacy of the originator for each message is verified by checking the enclosed fingerprint, and the detection is conducted both „„at the sensor side‟‟ (seemingly in a distributed manner by the notion) and at the base station. However, even the detection „„at the sensor side‟‟ needs the base station to process the alarms for decision making, and thus the scheme is throughout centralized. 1.4 Detecting Cloned Keys: It assumptions and application scenarios are quit different from other approaches in fact it addresses the detection of cloned cryptographic keys rather than cloned sensor nodes and falls into the category of anomaly detection [2]. The basic idea is that in the context of random key pre-distribution the keys employed by genuine nodes should follow a certain pattern. Therefore it is possible to monitor the key usage as authentication tokens and then detect statistical deviations that indicate clone attack. the approach detects the cloned keys by node authentication statistics those keys whose usage exceeds a certain threshold are considered cloned and erased from the network. 1.5 Set operation: SET logically partitions[11] the network into non overlapping regions respectively managed by leaders, and has these leaders respectively report to the base station all the ids of the nodes in the region, in the form of the subset. Intuitively, the “Intersection” of any two subsets of reports should be empty; otherwise, replication is detected 2. Distributed Detection There are two distributed detection methods they are eXtremely Efficient Detection (XED) and Efficient and Distributed Detection (EDD) [1] 2.1 Extremely Efficient Detection: XED has two steps Offline and Online step 2.1.1 Offline Step: It has a security parameter b and a cryptographic hash function h(.) are stored in each node. Two arrays of length n which keep the received random number and the materials used to check the legitimacy of received random number. Two arrays are initialized to zero vectors. B (u) - Initialized to be empty. 2.1.2 Online step: When two nodes u & v meet for first time it exchanges a random number. When v attempts to communicate with u next time, v should send the random number given by u during first meet. Then u check the random number given by v if the verification fails v will be blacklisted by u. If verification is success communication will be extended between u & v. The effectiveness of XED, unfortunately, heavily relies on the assumption that the replicas do not collude with each other. When replicas can communicate with each other, the replica can always share the newest received random numbers with the other neighbouring replicas, thus degrading the detection capability because multiple replicas are able to reply with the correct random number to encountered genuine nodes accordingly. 2.2 Efficient and Distributed Detection: EDD has two steps offline and online steps 2.2.1 Offline step: In the network without replicas, the number of times a node meets a specific node should be limited for a given time interval. 2.2.2 Online step: In the network with replicas, the number of times a node meets a particular node should be greater than the threshold. Since the effectiveness of EDD relies on the fact that each node faithfully and periodically broadcasts its ID, a strategy called selective silence could be taken by the replicas to compromise the detection capability of EDD. 3. PROPOSED WORK Assumed that sensor network consist of n node with node ID {1, 2, 3..., n}.The nodes are assumed to move with a constant velocity for a particular distance and then remain stationary for specified time. More over the nodes are assumed to communicate only during stationary period. The nodes are allowed to move randomly. The network is divided into clusters which are monitored by the respective cluster head. The cluster head maintain the data base which contain node ID, velocity and key for each node. The initial velocity of each node is encrypted with a key and stored as a packet in that particular node. Whenever a node enters into a cluster it should send its node id to the cluster head. This paper consists of two scenarios. 1. Replication inside a cluster 2. Replication in different cluster 3.1 Replication inside a cluster: when a node enter into a cluster it should give its id to the cluster head the cluster head will check for the reputation of that id in that cluster if there is some other node inside that particular cluster then the cluster will send a packet to those two node with the same id. That packet asks for the encrypted velocity from
  • 4. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 33 those two nodes. The node will send the packet with the encrypted velocity when this packet reach the cluster head it will decrypt the packet and check the velocity with its database. The node with different velocity is identified as replicated node. The request from replicated node is avoided and the replication is broadcasted to all cluster heads. So the replicated node cannot get any information from the network. Fig 3.1 shows the replication inside the cluster. The data base has the velocity as V1 for node 1 so the request from new node is denied. Fig 3.1 Node Replication Inside A Cluster 3.2 Replication in different cluster: : when a node enter into a cluster it should give its id to the cluster head the cluster head will check for the reputation of that id in that cluster if there is some other node inside that particular cluster. When there is no reputation in the same cluster the particular cluster head will intersect the data base of other cluster head to identify reputation. If there is reputation the cluster will send a packet to those two node with the same id. That packet asks for the encrypted velocity from those two nodes. The node will send the packet with the encrypted velocity when this packet reach the cluster head it will decrypt the packet and check the velocity by intersecting the database. The node with different velocity is identified as replicated node. The request from replicated node is avoided and the replication is broadcasted to all cluster heads. So the replicated node cannot get any information from the network. Fig 3.2 Node Replication On Different Cluster Fig 3.2 Show the replication in different cluster. The Node with id 1 send request to the cluster A. The cluster A does not have any node with node id 1 so it intersect the database with other clusters the cluster head B has a node with node id 1. After verification the request from replicated node is denied 4. SIMULATION RESULTS The proposed work is implemented using Network Simulator 2.The proposed work increased the energy efficiency and reduces the packet drop. In the existing work node id and location are broadcasted to neighbours and when a node get same id with different location it is found to be replicated with take more energy and time. To overcome this proposed work formed clusters with a cluster head this increases the energy efficiency. When the neighbour nodes get the details it will take time to find the replication if the replicated node and genuine nodes are far away. In the proposed work cluster head alone used to find the replica the time taken is so less. When the replicated node enters a cluster its genuinely is identified so the packet drop is not found the packet is forwarded only to the genuine node. The accuracy of finding the replicated node is high.
  • 5. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 34 Fig 4.1 Energy Efficiency Graph In the graph the X axis shows no of nodes and Y axis shows energy efficiency. Green line shows the energy efficiency of the proposed work and the red line shows the efficiency of existing method. When the number of node increase the efficiency goes down in existing work. In the proposed work the efficiency level is high compared with previous works. The increase in efficiency is due to the formation of cluster the node id is send only to cluster head in existing work the location and id is send to neighbours and the nodes are used to find the replication in the network. Fig 4.2 Packet Drop Graph In the above graph the X axis shows the time and the Y axis shows the packet drop. The red line shows the packet drops in existing work and the green line shows the packet drop in proposed work. Since the nodes are verified before entering the cluster which avoid packet drop. As the packet drop become less the packet delivery ratio become high which is shown in the Fig 4.3 Fig 4.3 Packet Delivery Ratio Graph In the graph X axis shows number of connection and Y axis shows packet delivery ratio. The green line shows the packet delivery ratio of proposed work and the red line shows the packet delivery ratio of existing work. The packet delivery ratio is high for the proposed work. 5. CONCLUSION In the proposed work formation of cluster and detecting replication is the main work. In the first method replication inside the cluster alone is found in order to improve the accuracy second method is proposed which is used to find the replication in different cluster too. The proposed work increased the efficiency and accuracy in finding node replication attack. REFERENCES 1. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Member, IEEE, and Sy-Yen Kuo, on “Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Network” IEEE transactions on information forensics and security, vol. 8, no. 5, may 2013 2. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, “On the Detection of Clones in Sensor Networks using Random Key Predistribution,” IEEE Trans. Syst., Man, Cybern. C, Ap- plicat. Rev., vol. 37, no. 6, pp. 1246–1258, Nov. 2007.
  • 6. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 35 3. Ho J-W, Liu D, Wright M, Das SK. on “Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks, Ad Hoc Network” 2009;7(November): 1476-88. 4. Parno B, Perrig A, Gligor V.Distributed detection of node replication attacks in sensor networks In: proceedings of the 26th IEEE symposium on security and privacy;2005 5. Poovendran R, Wang C, Roy S. Secure Localization and Time Synchronization for Wireless Sensor and Ad hoc Networks.New York Inc: Springer-Verlag; 2007. 6. Xing K, Liu F, Cheng X, Du DHC, Real time detection of clone attacks in wireless sensor networks. In: proceedings of the 28th international conference on distributed computing systems 2008. 7. Li Z, Gong G. DHT-Based Detection of Node Clone in Wireless Sensor Networks. In:Proceedings of the 1st international conference on ad hoc networks (ADHOCNETS‟09); 2009b. p. 240–55 8. Zhang Q, Yu T, Ning P. A framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions on Information and Systems Security 2008; 11(March): 12:1–37. September 9. Zhu WT, Zhou J, Deng R, Bao F. Detecting Node Replication Attacks in Mobile Sensor Networks: theory and approaches. Security and Communication Networks, available online May 2011. 10. Zhang M, Khanapure V, Chen S, Xiao X. Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. In: Proceedings of the 17th IEEE international conference on network protocols (ICNP‟09); 2009. p. 284–93. October 11. Wen Tao Zhu, Jianying, Robert H.Deng, FengBao on Detecting Node Replication Attacks in Wireless Sensor Networks Journal of network and computer application 35(2012) 12. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Noninteractive pairwise key es- tablishment for sensor networks,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 3, pp. 556–569, Sep. 2010. 13. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks,” in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2004, pp. 259–271. 14. D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996 15. J. Yi, J. Koo, and H. Cha, “A localization technique for mobile sensor networks using archived anchor information,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 64–72. 16. Huang Jian, Xiong Yan, Li Ming-Xi, Miao Fu You, “A Range- based detection method of replication attacks in wireless sensor networks”. International Conference on Information and computer networks,2012.