SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
30
Novel Detection Technique for Node Replication Attack in Mobile
Sensor Network
Dr. BABUKARUPPIAH1
, JEYALAKSHMI.V2
, PRADEEPA.N3
, VINOTHA.R4
1
Assistant Professor, 2,3,4
Under Graduates of Electronics and Communication Engineering
Velammal College of Engineering and Technology Madurai
ABSTRACT- A Wireless Sensor Network (WSN)
consists of a number of ultra small, autonomous
and resource-constrained sensor nodes, but is
often deployed in unattended and harsh
environments to perform various monitoring
tasks. The WSN is vulnerable to security threats
and susceptible to physical capture. Thus, it is
necessary to use effective mechanisms to protect
the network. This paper considers a typical
threat in the latter category known as the node
replication attack, where an adversary prepares
own low-cost sensor nodes and deceives the
network into accepting them as legitimate ones.
The technique used in static networks to find the
replicated nodes cannot apply to the mobile
sensor networks because the location of the node
is not stable in a network. Only few techniques
are proposed for mobile sensor networks. In
existing method to detect node replication attack
many beacon signal are sent which is costly and
not accurate .In this paper replicated nodes are
detected by cluster head using their velocity by
encryption and decryption techniques. The
advantages of our proposed algorithm include 1)
Accuracy 2) Efficiency 3) Reduces energy
Consumption.
1. INTRODUCTION
A. Wireless Sensor Networks
The Wireless sensor network is built of nodes
from a few to several hundreds or even thousands,
where each node is connected to one or sometimes
several sensors. Each such sensor network node has
typically several parts: a radio transceiver with an
internal antenna or connection to an external
antenna, a microcontroller, an electronic circuit for
interfacing with the sensors and an energy source,
usually a battery or an embedded form of energy
harvesting.
B. Security Attacks in Wireless Sensor Network
The WSN has many different types of attacks
Flooding attack: Flooding attack is a type of
denial of service attack in which the attacker send a
large number of packets to the target node their by
discontinues their communication in the network.
Jamming attack: In jamming attack, an
electromagnetic interference is caused in the
frequency of the network operations and also in the
targeted receiver so that the transmitted message is
corrupted.
Replay Attack: A replay attack is caused when the
transmitted data is maliciously replayed. It is
caused either by the originated. The forwarded
packets are copied and repeatedly transmitted to the
targeted node by the attacker
Spoofing Attack: in spoofing attack, the routing
loop is created and the routing information are
attracted and replayed so as to complicate the
network by the adversary.
Sinkhole Attack: In the sinkhole attack, the base
station is prevented from getting the information
regarding the sensing data. It draws the attention of
the network traffic by just advertising them as the
trusted node or as the shortest path.
C. Node Replication Attack
Node replication attack is also known as clone
attack. It exists in both the static and mobile
Wireless sensor network. It creates an extensive
harm to the network because the replicated node
also has the same identity as the legitimate
member. It is difficult to detect the replicated node
in mobile sensor network since the location can
vary from time to time. Node replication is done by
adversary by compromising one sensor node and
fabricates many replicas having the same identity
from the captured node.
Fig 1.1 Node replication attack
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
31
Fig 1.1 show the node replication attack where
the attacker collecting information from genuine
node to create a low cost replicated node
It is desirable but very challenging to have
efficient and effective distributed algorithms for
detecting replicas in mobile sensor network.
D. Related Works
In mobile sensor networks many works are
existing for node replication attack. In those papers
they had discussed about the 1) Witness finding
strategy 2) Setting threshold value 3) Detecting the
nodes with same identity [1], which consume more
energy, time and accuracy is less it cannot find the
replicated node but it will identify the replicated
and genuine node. So the data for both the node
will be blocked. They send both the location and
the signature ({L (v), sig (L (v))} where L (v) is the
location of v, sig (L (v)) is the signature of v) to
their neighbouring nodes which consume more
energy and time to detect the replicated node.
Sometimes the replication is not found in large
networks. Clusters are formed only for stationary
network [11] which will be more efficient for
mobile sensor network. They found the replication
only in a particular range [16] which cannot be
used in mobile sensor network. A threshold value is
set for all nodes to communicate with each other
but some time the genuine node may have the
necessary to communicate above the threshold so
the accuracy is less [2].The witness-finding strategy
exploits the fact that one sensor node cannot appear
at different locations, but, unfortunately, the sensor
nodes in mobile sensor networks have the
possibility of appearing at different locations at
different times, so the schemes in static wireless
sensor networks cannot be directly applied to
mobile sensor networks. Slight modification of
these schemes can be helpful for applicability to
mobile sensor networks. For instance, the witness-
finding strategy can adapt to mobile environments
if a timestamp is associated with each location
claim. In addition, setting a fixed time window in
advance and performing the witness-finding
strategy for every units of time can also keep
witness-finding feasible in mobile sensor networks.
Nevertheless, accurate time synchronization among
all the nodes in the network is necessary.
Moreover, when witness-finding is applied to
mobile sensor networks, routing the message to the
witnesses incurs even higher communication cost.
After identifying the replicas, a message used to
revoke the replicas, possibly issued by the base
station or the witness that detects the replicas, is
usually flooded throughout the network.
Nevertheless, network-wide broadcast is highly
energy consuming and, therefore, should be
avoided in the protocol design. Time
synchronization is needed. Nevertheless, it is still a
challenging task to synchronize the time of nodes
in the network, even though loose time
synchronization is sufficient for the detection
purpose. Hence, as we know that time
synchronization algorithms currently need to be
performed periodically to synchronize the time of
each node in the network, thereby incurring
tremendous overhead, it would be desirable to
remove this requirement. Witness-finding could be
categorized as a strategy of cooper active detection;
sensor nodes collaborate in certain ways to
determine which ones are the replicas. In this
regard, the effectiveness of witness-finding could
be reduced when a large number of sensor nodes
have been compromised, because the compromised
nodes can block the message issued by the nodes
near the replicas. Hence, the witness nodes cannot
discover the existence of replicas. The
effectiveness in detecting replicas, all of the
schemes adopting witness-finding have the
common drawback that the detection period cannot
be determined. In other words, the replica detection
algorithm can be triggered to identify the replicas
only after the network anomaly has been noticed by
the network planner. Therefore, a detection
algorithm that can always automatically detect the
replica is desirable. Since the existing algorithms
are built upon several other requirements, we have
found that the common weakness of the existing
protocols in detecting node replication attacks is
that a large amount of communication cost is still
unavoidable [1].
The node replication attack in mobile sensor
nodes are detected by two methods
1. Centralized Detection
In mobile sensor networks there is only one
centralized detection method called Sequential
Probability Ratio Test (SPRT).
1.1 Sequential Probability Ratio Test: In SPRT
[3], each and every time the node claims its
location and time information to their neighbours
and they forward it to the base station when they
enter into a new location.
1.2 Straight Forward Scheme: In straight forward
scheme [4] each node has to send a list of its
neighbours and the positions claimed by these
neighbours to the base station, which then
examines every neighbour list to look for replicated
sensor nodes. In a stationary WSN, conflicting
position claims for one node id indicates a
replication. Once the base station spots one or more
DETECTION METHODS
CENTRALIZED
DETECTION
DISTRIBUTED
DETECTION
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
32
replicas, it can revoke the replicated nodes by
flooding the network with an authenticated
revocation message.
1.3 Fingerprint Verification: This scheme
consists of two phases [6]. In the first phase, each
node u computes for each neighbour v ϵ N (u) the
fingerprint FPv, which is a reflection of v‟s fixed
neighbourhood characteristics; node v itself is also
capable of computing FPv. In the second phase, the
legitimacy of the originator for each message is
verified by checking the enclosed fingerprint, and
the detection is conducted both „„at the sensor
side‟‟ (seemingly in a distributed manner by the
notion) and at the base station. However, even the
detection „„at the sensor side‟‟ needs the base
station to process the alarms for decision making,
and thus the scheme is throughout centralized.
1.4 Detecting Cloned Keys: It assumptions and
application scenarios are quit different from other
approaches in fact it addresses the detection of
cloned cryptographic keys rather than cloned
sensor nodes and falls into the category of anomaly
detection [2]. The basic idea is that in the context
of random key pre-distribution the keys employed
by genuine nodes should follow a certain pattern.
Therefore it is possible to monitor the key usage as
authentication tokens and then detect statistical
deviations that indicate clone attack. the approach
detects the cloned keys by node authentication
statistics those keys whose usage exceeds a certain
threshold are considered cloned and erased from
the network.
1.5 Set operation: SET logically partitions[11] the
network into non overlapping regions respectively
managed by leaders, and has these leaders
respectively report to the base station all the ids of
the nodes in the region, in the form of the subset.
Intuitively, the “Intersection” of any two subsets of
reports should be empty; otherwise, replication is
detected
2. Distributed Detection
There are two distributed detection methods
they are eXtremely Efficient Detection (XED) and
Efficient and Distributed Detection (EDD) [1]
2.1 Extremely Efficient Detection: XED has two
steps Offline and Online step
2.1.1 Offline Step: It has a security parameter b
and a cryptographic hash function h(.) are stored in
each node. Two arrays of length n which keep the
received random number and the materials used to
check the legitimacy of received random number.
Two arrays are initialized to zero vectors.
B (u) - Initialized to be empty.
2.1.2 Online step: When two nodes u & v meet for
first time it exchanges a random number. When v
attempts to communicate with u next time, v should
send the random number given by u during first
meet. Then u check the random number given by v
if the verification fails v will be blacklisted by u. If
verification is success communication will be
extended between u & v.
The effectiveness of XED, unfortunately, heavily
relies on the assumption that the replicas do not
collude with each other. When replicas can
communicate with each other, the replica can
always share the newest received random numbers
with the other neighbouring replicas, thus
degrading the detection capability because multiple
replicas are able to reply with the correct random
number to encountered genuine nodes accordingly.
2.2 Efficient and Distributed Detection: EDD has
two steps offline and online steps
2.2.1 Offline step: In the network without replicas,
the number of times a node meets a specific node
should be limited for a given time interval.
2.2.2 Online step: In the network with replicas, the
number of times a node meets a particular node
should be greater than the threshold.
Since the effectiveness of EDD relies on the
fact that each node faithfully and periodically
broadcasts its ID, a strategy called selective silence
could be taken by the replicas to compromise the
detection capability of EDD.
3. PROPOSED WORK
Assumed that sensor network consist of n
node with node ID {1, 2, 3..., n}.The nodes are
assumed to move with a constant velocity for a
particular distance and then remain stationary for
specified time. More over the nodes are assumed to
communicate only during stationary period. The
nodes are allowed to move randomly. The network
is divided into clusters which are monitored by the
respective cluster head. The cluster head maintain
the data base which contain node ID, velocity and
key for each node. The initial velocity of each node
is encrypted with a key and stored as a packet in
that particular node. Whenever a node enters into a
cluster it should send its node id to the cluster head.
This paper consists of two scenarios.
1. Replication inside a cluster
2. Replication in different cluster
3.1 Replication inside a cluster: when a node
enter into a cluster it should give its id to the cluster
head the cluster head will check for the reputation
of that id in that cluster if there is some other node
inside that particular cluster then the cluster will
send a packet to those two node with the same id.
That packet asks for the encrypted velocity from
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
33
those two nodes. The node will send the packet
with the encrypted velocity when this packet reach
the cluster head it will decrypt the packet and check
the velocity with its database. The node with
different velocity is identified as replicated node.
The request from replicated node is avoided and the
replication is broadcasted to all cluster heads. So
the replicated node cannot get any information
from the network.
Fig 3.1 shows the replication inside the
cluster. The data base has the velocity as V1 for
node 1 so the request from new node is denied.
Fig 3.1 Node Replication Inside A Cluster
3.2 Replication in different cluster: : when a
node enter into a cluster it should give its id to the
cluster head the cluster head will check for the
reputation of that id in that cluster if there is some
other node inside that particular cluster. When there
is no reputation in the same cluster the particular
cluster head will intersect the data base of other
cluster head to identify reputation. If there is
reputation the cluster will send a packet to those
two node with the same id. That packet asks for the
encrypted velocity from those two nodes. The
node will send the packet with the encrypted
velocity when this packet reach the cluster head it
will decrypt the packet and check the velocity by
intersecting the database. The node with different
velocity is identified as replicated node. The
request from replicated node is avoided and the
replication is broadcasted to all cluster heads. So
the replicated node cannot get any information
from the network.
Fig 3.2 Node Replication On Different Cluster
Fig 3.2 Show the replication in different
cluster. The Node with id 1 send request to the
cluster A. The cluster A does not have any node
with node id 1 so it intersect the database with
other clusters the cluster head B has a node with
node id 1. After verification the request from
replicated node is denied
4. SIMULATION RESULTS
The proposed work is implemented using
Network Simulator 2.The proposed work increased
the energy efficiency and reduces the packet drop.
In the existing work node id and location are
broadcasted to neighbours and when a node get
same id with different location it is found to be
replicated with take more energy and time. To
overcome this proposed work formed clusters with
a cluster head this increases the energy efficiency.
When the neighbour nodes get the details it will
take time to find the replication if the replicated
node and genuine nodes are far away. In the
proposed work cluster head alone used to find the
replica the time taken is so less. When the
replicated node enters a cluster its genuinely is
identified so the packet drop is not found the packet
is forwarded only to the genuine node. The
accuracy of finding the replicated node is high.
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
34
Fig 4.1 Energy Efficiency Graph
In the graph the X axis shows no of nodes and
Y axis shows energy efficiency. Green line shows
the energy efficiency of the proposed work and the
red line shows the efficiency of existing method.
When the number of node increase the efficiency
goes down in existing work. In the proposed work
the efficiency level is high compared with previous
works. The increase in efficiency is due to the
formation of cluster the node id is send only to
cluster head in existing work the location and id is
send to neighbours and the nodes are used to find
the replication in the network.
Fig 4.2 Packet Drop Graph
In the above graph the X axis shows the time
and the Y axis shows the packet drop. The red line
shows the packet drops in existing work and the
green line shows the packet drop in proposed work.
Since the nodes are verified before entering the
cluster which avoid packet drop. As the packet
drop become less the packet delivery ratio become
high which is shown in the Fig 4.3
Fig 4.3 Packet Delivery Ratio Graph
In the graph X axis shows number of
connection and Y axis shows packet delivery ratio.
The green line shows the packet delivery ratio of
proposed work and the red line shows the packet
delivery ratio of existing work. The packet delivery
ratio is high for the proposed work.
5. CONCLUSION
In the proposed work formation of cluster and
detecting replication is the main work. In the first
method replication inside the cluster alone is found
in order to improve the accuracy second method is
proposed which is used to find the replication in
different cluster too. The proposed work increased
the efficiency and accuracy in finding node
replication attack.
REFERENCES
1. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu,
Member, IEEE, and Sy-Yen Kuo, on “Localized
Algorithms for Detection of Node Replication
Attacks in Mobile Sensor Network” IEEE
transactions on information forensics and
security, vol. 8, no. 5, may 2013
2. R. Brooks, P. Y. Govindaraju, M. Pirretti, N.
Vijaykrishnan, and M. T. Kandemir, “On the
Detection of Clones in Sensor Networks using
Random Key Predistribution,” IEEE Trans.
Syst., Man, Cybern. C, Ap- plicat. Rev., vol. 37,
no. 6, pp. 1246–1258, Nov. 2007.
International Journal of Electrical and Computing Engineering
Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218
35
3. Ho J-W, Liu D, Wright M, Das SK. on
“Distributed Detection of Replica Node Attacks
with Group Deployment Knowledge in
Wireless Sensor Networks, Ad Hoc Network”
2009;7(November): 1476-88.
4. Parno B, Perrig A, Gligor V.Distributed
detection of node replication attacks in sensor
networks In: proceedings of the 26th
IEEE
symposium on security and privacy;2005
5. Poovendran R, Wang C, Roy S. Secure
Localization and Time Synchronization for
Wireless Sensor and Ad hoc Networks.New
York Inc: Springer-Verlag; 2007.
6. Xing K, Liu F, Cheng X, Du DHC, Real time
detection of clone attacks in wireless sensor
networks. In: proceedings of the 28th
international conference on distributed
computing systems 2008.
7. Li Z, Gong G. DHT-Based Detection of Node
Clone in Wireless Sensor Networks.
In:Proceedings of the 1st international
conference on ad hoc networks
(ADHOCNETS‟09); 2009b. p. 240–55
8. Zhang Q, Yu T, Ning P. A framework for
Identifying Compromised Nodes in Wireless
Sensor Networks. ACM Transactions on
Information and Systems Security 2008;
11(March): 12:1–37. September
9. Zhu WT, Zhou J, Deng R, Bao F. Detecting
Node Replication Attacks in Mobile Sensor
Networks: theory and approaches. Security and
Communication Networks, available online
May 2011.
10. Zhang M, Khanapure V, Chen S, Xiao X.
Memory Efficient Protocols for Detecting Node
Replication Attacks in Wireless Sensor
Networks. In: Proceedings of the 17th IEEE
international conference on network protocols
(ICNP‟09); 2009. p. 284–93. October
11. Wen Tao Zhu, Jianying, Robert H.Deng,
FengBao on Detecting Node Replication
Attacks in Wireless Sensor Networks Journal of
network and computer application 35(2012)
12. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo,
“Noninteractive pairwise key es- tablishment
for sensor networks,” IEEE Trans. Inf.Forensics
Security, vol. 5, no. 3, pp. 556–569, Sep. 2010.
13. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An
interleaved hop-by-hop authentication scheme
for filtering false data in sensor networks,” in
Proc. IEEE Symp. Security and Privacy (S&P),
Oakland, CA, USA, 2004, pp. 259–271.
14. D. B. Johnson and D. A. Maltz, “Dynamic
source routing in ad hoc wireless networks,”
Mobile Comput., pp. 153–181, 1996
15. J. Yi, J. Koo, and H. Cha, “A localization
technique for mobile sensor networks using
archived anchor information,” in Proc. IEEE
Conf. Sensor, Mesh, and Ad Hoc
Communications and Networks (SECON),
California, USA, 2008, pp. 64–72.
16. Huang Jian, Xiong Yan, Li Ming-Xi, Miao Fu
You, “A Range- based detection method of
replication attacks in wireless sensor networks”.
International Conference on Information and
computer networks,2012.

More Related Content

What's hot

Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNIJTET Journal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 

What's hot (18)

C0511318
C0511318C0511318
C0511318
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
A1803060110
A1803060110A1803060110
A1803060110
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 

Viewers also liked

Ziua a treia Polonia - oct 2012
Ziua a treia   Polonia - oct 2012Ziua a treia   Polonia - oct 2012
Ziua a treia Polonia - oct 2012sc3carei
 
Calendario académico 2015 I Cohorte Grupo 1 Planificación fiscal aduanera y ...
Calendario académico 2015 I Cohorte Grupo 1  Planificación fiscal aduanera y ...Calendario académico 2015 I Cohorte Grupo 1  Planificación fiscal aduanera y ...
Calendario académico 2015 I Cohorte Grupo 1 Planificación fiscal aduanera y ...Unipap Investiga Postgrado
 
התנגדות מסוף תחבורה מזרחי
התנגדות מסוף תחבורה מזרחיהתנגדות מסוף תחבורה מזרחי
התנגדות מסוף תחבורה מזרחיvatikim project
 
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03 learnedreproduc69
 
Publie ds1 2-fonctions-calculs-graphique
Publie ds1 2-fonctions-calculs-graphiquePublie ds1 2-fonctions-calculs-graphique
Publie ds1 2-fonctions-calculs-graphiqueMATHS-LYCEE.FR
 
Θερμοπύλες (2014) Γ΄1
Θερμοπύλες (2014) Γ΄1Θερμοπύλες (2014) Γ΄1
Θερμοπύλες (2014) Γ΄1mara_petridou
 
Prinopoulou ouropiitiko sistima
Prinopoulou ouropiitiko sistimaPrinopoulou ouropiitiko sistima
Prinopoulou ouropiitiko sistimaprinopouloumaria
 
Ich Liebe Dich Mein Schatz !!!
Ich Liebe Dich Mein Schatz !!!Ich Liebe Dich Mein Schatz !!!
Ich Liebe Dich Mein Schatz !!!Bruno1
 
Joan Martorell: Tirant lo blanc
Joan Martorell: Tirant lo blancJoan Martorell: Tirant lo blanc
Joan Martorell: Tirant lo blancnereaamb
 
Yellowstone presentation new
Yellowstone presentation newYellowstone presentation new
Yellowstone presentation newamschech
 
Repaso de matemáticas power poin
Repaso de matemáticas power poinRepaso de matemáticas power poin
Repaso de matemáticas power poinjulialajara
 
2009 Convite+Encerramento Mesa Sapucaia
2009 Convite+Encerramento Mesa Sapucaia2009 Convite+Encerramento Mesa Sapucaia
2009 Convite+Encerramento Mesa Sapucaiaguestd42782
 
Presentación adivinanzas
Presentación adivinanzasPresentación adivinanzas
Presentación adivinanzasPaulavt6
 
Neue Markenführung in digitalen Zeiten
Neue Markenführung in digitalen ZeitenNeue Markenführung in digitalen Zeiten
Neue Markenführung in digitalen Zeitenneuwaerts
 
Elantonio y los_viejos_rockeros
Elantonio y los_viejos_rockerosElantonio y los_viejos_rockeros
Elantonio y los_viejos_rockerossafacou8586
 

Viewers also liked (20)

Ziua a treia Polonia - oct 2012
Ziua a treia   Polonia - oct 2012Ziua a treia   Polonia - oct 2012
Ziua a treia Polonia - oct 2012
 
Calendario académico 2015 I Cohorte Grupo 1 Planificación fiscal aduanera y ...
Calendario académico 2015 I Cohorte Grupo 1  Planificación fiscal aduanera y ...Calendario académico 2015 I Cohorte Grupo 1  Planificación fiscal aduanera y ...
Calendario académico 2015 I Cohorte Grupo 1 Planificación fiscal aduanera y ...
 
התנגדות מסוף תחבורה מזרחי
התנגדות מסוף תחבורה מזרחיהתנגדות מסוף תחבורה מזרחי
התנגדות מסוף תחבורה מזרחי
 
lenira
leniralenira
lenira
 
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03
Kidnapped and turned out to Ch 03
 
La ciutat
La ciutatLa ciutat
La ciutat
 
Publie ds1 2-fonctions-calculs-graphique
Publie ds1 2-fonctions-calculs-graphiquePublie ds1 2-fonctions-calculs-graphique
Publie ds1 2-fonctions-calculs-graphique
 
Θερμοπύλες (2014) Γ΄1
Θερμοπύλες (2014) Γ΄1Θερμοπύλες (2014) Γ΄1
Θερμοπύλες (2014) Γ΄1
 
Prinopoulou ouropiitiko sistima
Prinopoulou ouropiitiko sistimaPrinopoulou ouropiitiko sistima
Prinopoulou ouropiitiko sistima
 
Els sentiments
Els sentimentsEls sentiments
Els sentiments
 
Ich Liebe Dich Mein Schatz !!!
Ich Liebe Dich Mein Schatz !!!Ich Liebe Dich Mein Schatz !!!
Ich Liebe Dich Mein Schatz !!!
 
Joan Martorell: Tirant lo blanc
Joan Martorell: Tirant lo blancJoan Martorell: Tirant lo blanc
Joan Martorell: Tirant lo blanc
 
Yellowstone presentation new
Yellowstone presentation newYellowstone presentation new
Yellowstone presentation new
 
Repaso de matemáticas power poin
Repaso de matemáticas power poinRepaso de matemáticas power poin
Repaso de matemáticas power poin
 
Malén Ara Mari
Malén Ara MariMalén Ara Mari
Malén Ara Mari
 
Customers
CustomersCustomers
Customers
 
2009 Convite+Encerramento Mesa Sapucaia
2009 Convite+Encerramento Mesa Sapucaia2009 Convite+Encerramento Mesa Sapucaia
2009 Convite+Encerramento Mesa Sapucaia
 
Presentación adivinanzas
Presentación adivinanzasPresentación adivinanzas
Presentación adivinanzas
 
Neue Markenführung in digitalen Zeiten
Neue Markenführung in digitalen ZeitenNeue Markenführung in digitalen Zeiten
Neue Markenführung in digitalen Zeiten
 
Elantonio y los_viejos_rockeros
Elantonio y los_viejos_rockerosElantonio y los_viejos_rockeros
Elantonio y los_viejos_rockeros
 

Similar to Iisrt 6-node detection technique for node replication attack in mobile sensor network

Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 

Similar to Iisrt 6-node detection technique for node replication attack in mobile sensor network (20)

D0952126
D0952126D0952126
D0952126
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
D0961927
D0961927D0961927
D0961927
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 

More from IISRTJournals

(1 4) nandhini iisrt
(1 4) nandhini iisrt(1 4) nandhini iisrt
(1 4) nandhini iisrtIISRTJournals
 
(27 33) sridharan sidhu
(27 33) sridharan sidhu(27 33) sridharan sidhu
(27 33) sridharan sidhuIISRTJournals
 
(17 22) karthick sir
(17 22) karthick sir(17 22) karthick sir
(17 22) karthick sirIISRTJournals
 
(5 10) chitra natarajan
(5 10) chitra natarajan(5 10) chitra natarajan
(5 10) chitra natarajanIISRTJournals
 
Iisrt 7-design of multi purpose planar antenna
Iisrt 7-design of multi purpose planar antennaIisrt 7-design of multi purpose planar antenna
Iisrt 7-design of multi purpose planar antennaIISRTJournals
 
Iisrt 5-design of oscillators using cmos ota
Iisrt 5-design of oscillators using cmos otaIisrt 5-design of oscillators using cmos ota
Iisrt 5-design of oscillators using cmos otaIISRTJournals
 
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...IISRTJournals
 
Iisrt 3-design of rectangular patch antenna array using advanced design metho...
Iisrt 3-design of rectangular patch antenna array using advanced design metho...Iisrt 3-design of rectangular patch antenna array using advanced design metho...
Iisrt 3-design of rectangular patch antenna array using advanced design metho...IISRTJournals
 
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...Iisrt 2-mitigating effect of flickering and dimming in visible light communic...
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...IISRTJournals
 
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...IISRTJournals
 

More from IISRTJournals (12)

(1 4) nandhini iisrt
(1 4) nandhini iisrt(1 4) nandhini iisrt
(1 4) nandhini iisrt
 
(27 33) sridharan sidhu
(27 33) sridharan sidhu(27 33) sridharan sidhu
(27 33) sridharan sidhu
 
(23 26) siraj pa
(23 26) siraj pa(23 26) siraj pa
(23 26) siraj pa
 
(17 22) karthick sir
(17 22) karthick sir(17 22) karthick sir
(17 22) karthick sir
 
(11 16) rajiv g
(11 16) rajiv g(11 16) rajiv g
(11 16) rajiv g
 
(5 10) chitra natarajan
(5 10) chitra natarajan(5 10) chitra natarajan
(5 10) chitra natarajan
 
Iisrt 7-design of multi purpose planar antenna
Iisrt 7-design of multi purpose planar antennaIisrt 7-design of multi purpose planar antenna
Iisrt 7-design of multi purpose planar antenna
 
Iisrt 5-design of oscillators using cmos ota
Iisrt 5-design of oscillators using cmos otaIisrt 5-design of oscillators using cmos ota
Iisrt 5-design of oscillators using cmos ota
 
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...
Iisrt 4-study on 20 and 50 gbps soliton transmission in conventional single m...
 
Iisrt 3-design of rectangular patch antenna array using advanced design metho...
Iisrt 3-design of rectangular patch antenna array using advanced design metho...Iisrt 3-design of rectangular patch antenna array using advanced design metho...
Iisrt 3-design of rectangular patch antenna array using advanced design metho...
 
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...Iisrt 2-mitigating effect of flickering and dimming in visible light communic...
Iisrt 2-mitigating effect of flickering and dimming in visible light communic...
 
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...
Iisrt 1-rz based dispersion compensation technique in dwdm system for broadba...
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Iisrt 6-node detection technique for node replication attack in mobile sensor network

  • 1. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 30 Novel Detection Technique for Node Replication Attack in Mobile Sensor Network Dr. BABUKARUPPIAH1 , JEYALAKSHMI.V2 , PRADEEPA.N3 , VINOTHA.R4 1 Assistant Professor, 2,3,4 Under Graduates of Electronics and Communication Engineering Velammal College of Engineering and Technology Madurai ABSTRACT- A Wireless Sensor Network (WSN) consists of a number of ultra small, autonomous and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. This paper considers a typical threat in the latter category known as the node replication attack, where an adversary prepares own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. The technique used in static networks to find the replicated nodes cannot apply to the mobile sensor networks because the location of the node is not stable in a network. Only few techniques are proposed for mobile sensor networks. In existing method to detect node replication attack many beacon signal are sent which is costly and not accurate .In this paper replicated nodes are detected by cluster head using their velocity by encryption and decryption techniques. The advantages of our proposed algorithm include 1) Accuracy 2) Efficiency 3) Reduces energy Consumption. 1. INTRODUCTION A. Wireless Sensor Networks The Wireless sensor network is built of nodes from a few to several hundreds or even thousands, where each node is connected to one or sometimes several sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. B. Security Attacks in Wireless Sensor Network The WSN has many different types of attacks Flooding attack: Flooding attack is a type of denial of service attack in which the attacker send a large number of packets to the target node their by discontinues their communication in the network. Jamming attack: In jamming attack, an electromagnetic interference is caused in the frequency of the network operations and also in the targeted receiver so that the transmitted message is corrupted. Replay Attack: A replay attack is caused when the transmitted data is maliciously replayed. It is caused either by the originated. The forwarded packets are copied and repeatedly transmitted to the targeted node by the attacker Spoofing Attack: in spoofing attack, the routing loop is created and the routing information are attracted and replayed so as to complicate the network by the adversary. Sinkhole Attack: In the sinkhole attack, the base station is prevented from getting the information regarding the sensing data. It draws the attention of the network traffic by just advertising them as the trusted node or as the shortest path. C. Node Replication Attack Node replication attack is also known as clone attack. It exists in both the static and mobile Wireless sensor network. It creates an extensive harm to the network because the replicated node also has the same identity as the legitimate member. It is difficult to detect the replicated node in mobile sensor network since the location can vary from time to time. Node replication is done by adversary by compromising one sensor node and fabricates many replicas having the same identity from the captured node. Fig 1.1 Node replication attack
  • 2. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 31 Fig 1.1 show the node replication attack where the attacker collecting information from genuine node to create a low cost replicated node It is desirable but very challenging to have efficient and effective distributed algorithms for detecting replicas in mobile sensor network. D. Related Works In mobile sensor networks many works are existing for node replication attack. In those papers they had discussed about the 1) Witness finding strategy 2) Setting threshold value 3) Detecting the nodes with same identity [1], which consume more energy, time and accuracy is less it cannot find the replicated node but it will identify the replicated and genuine node. So the data for both the node will be blocked. They send both the location and the signature ({L (v), sig (L (v))} where L (v) is the location of v, sig (L (v)) is the signature of v) to their neighbouring nodes which consume more energy and time to detect the replicated node. Sometimes the replication is not found in large networks. Clusters are formed only for stationary network [11] which will be more efficient for mobile sensor network. They found the replication only in a particular range [16] which cannot be used in mobile sensor network. A threshold value is set for all nodes to communicate with each other but some time the genuine node may have the necessary to communicate above the threshold so the accuracy is less [2].The witness-finding strategy exploits the fact that one sensor node cannot appear at different locations, but, unfortunately, the sensor nodes in mobile sensor networks have the possibility of appearing at different locations at different times, so the schemes in static wireless sensor networks cannot be directly applied to mobile sensor networks. Slight modification of these schemes can be helpful for applicability to mobile sensor networks. For instance, the witness- finding strategy can adapt to mobile environments if a timestamp is associated with each location claim. In addition, setting a fixed time window in advance and performing the witness-finding strategy for every units of time can also keep witness-finding feasible in mobile sensor networks. Nevertheless, accurate time synchronization among all the nodes in the network is necessary. Moreover, when witness-finding is applied to mobile sensor networks, routing the message to the witnesses incurs even higher communication cost. After identifying the replicas, a message used to revoke the replicas, possibly issued by the base station or the witness that detects the replicas, is usually flooded throughout the network. Nevertheless, network-wide broadcast is highly energy consuming and, therefore, should be avoided in the protocol design. Time synchronization is needed. Nevertheless, it is still a challenging task to synchronize the time of nodes in the network, even though loose time synchronization is sufficient for the detection purpose. Hence, as we know that time synchronization algorithms currently need to be performed periodically to synchronize the time of each node in the network, thereby incurring tremendous overhead, it would be desirable to remove this requirement. Witness-finding could be categorized as a strategy of cooper active detection; sensor nodes collaborate in certain ways to determine which ones are the replicas. In this regard, the effectiveness of witness-finding could be reduced when a large number of sensor nodes have been compromised, because the compromised nodes can block the message issued by the nodes near the replicas. Hence, the witness nodes cannot discover the existence of replicas. The effectiveness in detecting replicas, all of the schemes adopting witness-finding have the common drawback that the detection period cannot be determined. In other words, the replica detection algorithm can be triggered to identify the replicas only after the network anomaly has been noticed by the network planner. Therefore, a detection algorithm that can always automatically detect the replica is desirable. Since the existing algorithms are built upon several other requirements, we have found that the common weakness of the existing protocols in detecting node replication attacks is that a large amount of communication cost is still unavoidable [1]. The node replication attack in mobile sensor nodes are detected by two methods 1. Centralized Detection In mobile sensor networks there is only one centralized detection method called Sequential Probability Ratio Test (SPRT). 1.1 Sequential Probability Ratio Test: In SPRT [3], each and every time the node claims its location and time information to their neighbours and they forward it to the base station when they enter into a new location. 1.2 Straight Forward Scheme: In straight forward scheme [4] each node has to send a list of its neighbours and the positions claimed by these neighbours to the base station, which then examines every neighbour list to look for replicated sensor nodes. In a stationary WSN, conflicting position claims for one node id indicates a replication. Once the base station spots one or more DETECTION METHODS CENTRALIZED DETECTION DISTRIBUTED DETECTION
  • 3. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 32 replicas, it can revoke the replicated nodes by flooding the network with an authenticated revocation message. 1.3 Fingerprint Verification: This scheme consists of two phases [6]. In the first phase, each node u computes for each neighbour v ϵ N (u) the fingerprint FPv, which is a reflection of v‟s fixed neighbourhood characteristics; node v itself is also capable of computing FPv. In the second phase, the legitimacy of the originator for each message is verified by checking the enclosed fingerprint, and the detection is conducted both „„at the sensor side‟‟ (seemingly in a distributed manner by the notion) and at the base station. However, even the detection „„at the sensor side‟‟ needs the base station to process the alarms for decision making, and thus the scheme is throughout centralized. 1.4 Detecting Cloned Keys: It assumptions and application scenarios are quit different from other approaches in fact it addresses the detection of cloned cryptographic keys rather than cloned sensor nodes and falls into the category of anomaly detection [2]. The basic idea is that in the context of random key pre-distribution the keys employed by genuine nodes should follow a certain pattern. Therefore it is possible to monitor the key usage as authentication tokens and then detect statistical deviations that indicate clone attack. the approach detects the cloned keys by node authentication statistics those keys whose usage exceeds a certain threshold are considered cloned and erased from the network. 1.5 Set operation: SET logically partitions[11] the network into non overlapping regions respectively managed by leaders, and has these leaders respectively report to the base station all the ids of the nodes in the region, in the form of the subset. Intuitively, the “Intersection” of any two subsets of reports should be empty; otherwise, replication is detected 2. Distributed Detection There are two distributed detection methods they are eXtremely Efficient Detection (XED) and Efficient and Distributed Detection (EDD) [1] 2.1 Extremely Efficient Detection: XED has two steps Offline and Online step 2.1.1 Offline Step: It has a security parameter b and a cryptographic hash function h(.) are stored in each node. Two arrays of length n which keep the received random number and the materials used to check the legitimacy of received random number. Two arrays are initialized to zero vectors. B (u) - Initialized to be empty. 2.1.2 Online step: When two nodes u & v meet for first time it exchanges a random number. When v attempts to communicate with u next time, v should send the random number given by u during first meet. Then u check the random number given by v if the verification fails v will be blacklisted by u. If verification is success communication will be extended between u & v. The effectiveness of XED, unfortunately, heavily relies on the assumption that the replicas do not collude with each other. When replicas can communicate with each other, the replica can always share the newest received random numbers with the other neighbouring replicas, thus degrading the detection capability because multiple replicas are able to reply with the correct random number to encountered genuine nodes accordingly. 2.2 Efficient and Distributed Detection: EDD has two steps offline and online steps 2.2.1 Offline step: In the network without replicas, the number of times a node meets a specific node should be limited for a given time interval. 2.2.2 Online step: In the network with replicas, the number of times a node meets a particular node should be greater than the threshold. Since the effectiveness of EDD relies on the fact that each node faithfully and periodically broadcasts its ID, a strategy called selective silence could be taken by the replicas to compromise the detection capability of EDD. 3. PROPOSED WORK Assumed that sensor network consist of n node with node ID {1, 2, 3..., n}.The nodes are assumed to move with a constant velocity for a particular distance and then remain stationary for specified time. More over the nodes are assumed to communicate only during stationary period. The nodes are allowed to move randomly. The network is divided into clusters which are monitored by the respective cluster head. The cluster head maintain the data base which contain node ID, velocity and key for each node. The initial velocity of each node is encrypted with a key and stored as a packet in that particular node. Whenever a node enters into a cluster it should send its node id to the cluster head. This paper consists of two scenarios. 1. Replication inside a cluster 2. Replication in different cluster 3.1 Replication inside a cluster: when a node enter into a cluster it should give its id to the cluster head the cluster head will check for the reputation of that id in that cluster if there is some other node inside that particular cluster then the cluster will send a packet to those two node with the same id. That packet asks for the encrypted velocity from
  • 4. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 33 those two nodes. The node will send the packet with the encrypted velocity when this packet reach the cluster head it will decrypt the packet and check the velocity with its database. The node with different velocity is identified as replicated node. The request from replicated node is avoided and the replication is broadcasted to all cluster heads. So the replicated node cannot get any information from the network. Fig 3.1 shows the replication inside the cluster. The data base has the velocity as V1 for node 1 so the request from new node is denied. Fig 3.1 Node Replication Inside A Cluster 3.2 Replication in different cluster: : when a node enter into a cluster it should give its id to the cluster head the cluster head will check for the reputation of that id in that cluster if there is some other node inside that particular cluster. When there is no reputation in the same cluster the particular cluster head will intersect the data base of other cluster head to identify reputation. If there is reputation the cluster will send a packet to those two node with the same id. That packet asks for the encrypted velocity from those two nodes. The node will send the packet with the encrypted velocity when this packet reach the cluster head it will decrypt the packet and check the velocity by intersecting the database. The node with different velocity is identified as replicated node. The request from replicated node is avoided and the replication is broadcasted to all cluster heads. So the replicated node cannot get any information from the network. Fig 3.2 Node Replication On Different Cluster Fig 3.2 Show the replication in different cluster. The Node with id 1 send request to the cluster A. The cluster A does not have any node with node id 1 so it intersect the database with other clusters the cluster head B has a node with node id 1. After verification the request from replicated node is denied 4. SIMULATION RESULTS The proposed work is implemented using Network Simulator 2.The proposed work increased the energy efficiency and reduces the packet drop. In the existing work node id and location are broadcasted to neighbours and when a node get same id with different location it is found to be replicated with take more energy and time. To overcome this proposed work formed clusters with a cluster head this increases the energy efficiency. When the neighbour nodes get the details it will take time to find the replication if the replicated node and genuine nodes are far away. In the proposed work cluster head alone used to find the replica the time taken is so less. When the replicated node enters a cluster its genuinely is identified so the packet drop is not found the packet is forwarded only to the genuine node. The accuracy of finding the replicated node is high.
  • 5. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 34 Fig 4.1 Energy Efficiency Graph In the graph the X axis shows no of nodes and Y axis shows energy efficiency. Green line shows the energy efficiency of the proposed work and the red line shows the efficiency of existing method. When the number of node increase the efficiency goes down in existing work. In the proposed work the efficiency level is high compared with previous works. The increase in efficiency is due to the formation of cluster the node id is send only to cluster head in existing work the location and id is send to neighbours and the nodes are used to find the replication in the network. Fig 4.2 Packet Drop Graph In the above graph the X axis shows the time and the Y axis shows the packet drop. The red line shows the packet drops in existing work and the green line shows the packet drop in proposed work. Since the nodes are verified before entering the cluster which avoid packet drop. As the packet drop become less the packet delivery ratio become high which is shown in the Fig 4.3 Fig 4.3 Packet Delivery Ratio Graph In the graph X axis shows number of connection and Y axis shows packet delivery ratio. The green line shows the packet delivery ratio of proposed work and the red line shows the packet delivery ratio of existing work. The packet delivery ratio is high for the proposed work. 5. CONCLUSION In the proposed work formation of cluster and detecting replication is the main work. In the first method replication inside the cluster alone is found in order to improve the accuracy second method is proposed which is used to find the replication in different cluster too. The proposed work increased the efficiency and accuracy in finding node replication attack. REFERENCES 1. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Member, IEEE, and Sy-Yen Kuo, on “Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Network” IEEE transactions on information forensics and security, vol. 8, no. 5, may 2013 2. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, “On the Detection of Clones in Sensor Networks using Random Key Predistribution,” IEEE Trans. Syst., Man, Cybern. C, Ap- plicat. Rev., vol. 37, no. 6, pp. 1246–1258, Nov. 2007.
  • 6. International Journal of Electrical and Computing Engineering Vol. 1, Issue. 1, July – 2014 ISSN (Online): 2349-8218 35 3. Ho J-W, Liu D, Wright M, Das SK. on “Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks, Ad Hoc Network” 2009;7(November): 1476-88. 4. Parno B, Perrig A, Gligor V.Distributed detection of node replication attacks in sensor networks In: proceedings of the 26th IEEE symposium on security and privacy;2005 5. Poovendran R, Wang C, Roy S. Secure Localization and Time Synchronization for Wireless Sensor and Ad hoc Networks.New York Inc: Springer-Verlag; 2007. 6. Xing K, Liu F, Cheng X, Du DHC, Real time detection of clone attacks in wireless sensor networks. In: proceedings of the 28th international conference on distributed computing systems 2008. 7. Li Z, Gong G. DHT-Based Detection of Node Clone in Wireless Sensor Networks. In:Proceedings of the 1st international conference on ad hoc networks (ADHOCNETS‟09); 2009b. p. 240–55 8. Zhang Q, Yu T, Ning P. A framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions on Information and Systems Security 2008; 11(March): 12:1–37. September 9. Zhu WT, Zhou J, Deng R, Bao F. Detecting Node Replication Attacks in Mobile Sensor Networks: theory and approaches. Security and Communication Networks, available online May 2011. 10. Zhang M, Khanapure V, Chen S, Xiao X. Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. In: Proceedings of the 17th IEEE international conference on network protocols (ICNP‟09); 2009. p. 284–93. October 11. Wen Tao Zhu, Jianying, Robert H.Deng, FengBao on Detecting Node Replication Attacks in Wireless Sensor Networks Journal of network and computer application 35(2012) 12. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Noninteractive pairwise key es- tablishment for sensor networks,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 3, pp. 556–569, Sep. 2010. 13. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks,” in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2004, pp. 259–271. 14. D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996 15. J. Yi, J. Koo, and H. Cha, “A localization technique for mobile sensor networks using archived anchor information,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 64–72. 16. Huang Jian, Xiong Yan, Li Ming-Xi, Miao Fu You, “A Range- based detection method of replication attacks in wireless sensor networks”. International Conference on Information and computer networks,2012.