SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 92-96
www.iosrjournals.org
DOI: 10.9790/0661-17129296 www.iosrjournals.org 92 | Page
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Sandip D. Girase1
, Ashish T. Bhole2
1,2
Department of Computer Engineering,
SSBT’s College Of Engineering & Technology, Jalgaon, Maharashtra, India
Abstract: Network security has become a challenging area, historically only tackled by well qualified and
familiar experts. Although more pupils are becoming wired, an increasing number of pupils need to understand
basics of security in the network world. The paper is written from the prospective of the basic computer user
and information systems administrator, illuminating the concepts needed to go through the hype in the
marketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allow
the attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work on
replica node recognition relies on set sensor locations and hence do not work in mobile sensor network. The
paper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to the
sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can
result in a fast and effective detection of mobile replica nodes within wireless sensor network.
Keywords: Wireless sensor network (WSN), network security, attack detection, node replication, tamper
resistant hardware, sequential probability ratio test (SPRT)
I. Introduction
Now a day’s robotics have the advances which is responsible for developing several [1] architecture for
autonomous wireless sensor networks. This unattended nature of wireless sensor networks can be exploited by
adversaries. The adversaries takes the secret keying materials from a compromised node, generates a huge
amount of attacker-controlled replicas that share the node’s keying resources and ID, and then spreads these
replicas right through the network. With a particular captured node, the adversary can form as many replica
nodes as he has the hardware to generate [8]. One of the solutions for this is the use of tamper-resistance
hardware to prevent adversary from extracting the keying material.
1.1 Tamper–resistant hardware
For protecting the keys the appropriate way is to store them in a tamper-resistant hardware tool. Such
devices can be used for applications ranging from safe e-mail to electronic cash and credit cards. They suggest
substantial shield to the keys residing within them, thus providing a few guarantee that these keys have not been
maliciously read or modified. Typically in advance access to the contents of a tamper-resistant device requires
knowledge of a PIN or password exactly what type of access can be gained with this knowledge is device
dependent.
1.2 Sequential hypothesis test
The sequential hypothesis testing is statistical analysis where the sample size is not set in progress. as a
replacement for data are evaluate as they are collected, and additional sampling is stopped in accordance with a
pre-defined stopping rule as soon as significant results are observed. as a result a climax may sometimes be
reached at a much earlier stage than would be possible with more classical hypothesis testing or estimation, at
consequently lower financial and or individual cost.
1.3 Sequential probability ratio test
The sequential probability ratio test (SPRT) is a specific [4] sequential hypothesis test which is
developed for use in quality control studies in the realm of mechanized, SPRT have been formulate used for use
in the computerized testing of human examinees as a termination criterion .It is nothing but a statistical
hypothesis test which is a method of making decision by means of data, whether commencing a forbidden
experimentation or an observational lessons. In information, a result is called statistically significant if it is
unlikely to have occurred by probability alone, according to a fixed threshold probability, the significance level.
These tests are used in determining what outcomes of an experiment would lead to a rejection of the null
hypothesis for a pre-specified level of significance helping to decide whether experimental results contain
enough information to cast doubt on conventional wisdom. It is occasionally called assenting data investigation,
in difference to investigative data analysis. Statistical hypothesis testing is a key technique of frequents
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 93 | Page
statistical inference. The critical region of a hypothesis test is the set of all outcomes which cause the null
hypothesis to be rejected in support of the alternative hypothesis.
1.4 Null hypothesis
The null hypothesis is nothing but a typically corresponds to a general or default position Null
hypothesis is typically paired with a subsequent assumption, the substitute hypothesis, which assert a particular
relationship between the phenomena. The substitute need not be the reasonable negation of the null hypothesis it
predicts the results from the experiment if the substitute assumption is true. The use of substitute hypotheses
was not part of Fisher's formulation, but became standard. It is important to understand that the null hypothesis
can never be expanded beyond the doubt. A set of data can only reject a null hypothesis or fail to reject it. For
instance, if similarity of two groups. Null hypothesis can be work by collecting data and measuring how likely
the particular set of data is, assuming the null hypothesis is true. The null hypothesis (H0) choice and
consideration of directionality is critical.
1.5 Alternative hypothesis
The alternative hypothesis (or maintained hypothesis or research hypothesis and the null hypothesis are
the two rival hypotheses which are compared by a statistical hypothesis test. Sequential probability is a
statistical decision process. It consists of one dimensional random walk with lower and upper limit [5]. A
random walk is a mathematical formalization of a path which consists of a succession of random steps.
II. Related Work
2.1 Attack Resilient Time Synchronization in Wireless Sensor Network
In 2006, H. Song, S. Zhu, and G. Cao the time synchronization in wireless sensor network for attack
resilient. In the sensor network application required time to be synchronized within the network [7]. For instance
the applications include mobile object tracking, data aggregation, TDMA radio arrangement, and message
ordering, to name a few. a sensor network is deployed in an area of interest to monitor passing objects which is
the application of mobile object tracking. The detecting nodes record the detecting location and the detecting
time, object is papering. Later, these location and time information are sent to the aggregation node which
estimates the moving trajectory of the object [6]. Without accurate time synchronization, the estimated
trajectory of the tracked object could differ greatly from the actual one. It also covers the network time
synchronization method relay on message exchange between the nodes. Paper also gives important on the
receiver –receiver model reference broadcast synchronization scheme (RBS) and its prototypes are used.
2.2 A Randomized, Efficient and Distributed Protocol
In 2007, M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, discovered the RED protocol for detection
of replication attack in wireless sensor network. The randomized, efficient and distributed protocol is highly
efficient as compared to other distributed protocol in the sense of communication, memory and computation [2].
In this every claim message of node is signed with its private key ,which allows other nodes to identify any
malicious node not abiding to the protocol .It also allows adversary to know the witness set for any given ID.
But the witness of the node will be any were in the network and it change at every protocol iteration I
unpredicted way .In order to prevent RED from detecting the replicas it is required to be ubiquitous and to
capture all the witness of the cloned nodes within a window period which can be at most share among the
disclosure of rand and next protocol invocation. By considering adversary movement speed and realistic
network size, it admires that few chances for the adversary to perform the same attack. RED performs the
requirement that are area-obliviousness, ID-obliviousness ,low overhead, over head balancing and high replica
attack detection probability .Consider the simulation in that n=1,000 nodes in the network, r=0.1 communication
radius, g=1 and p=0.1 for the red protocol.
2.3 Distributed Detection of Node Attacks with Deployment Knowledge
The idea behind the scheme is to have nodes report location claims, which identify their positions and
attempt to detect conflicting information that single one node in more than one location. For this, every node
should have location claims and verify and store signed location claims of every other node .It gives the idea
behind it that every node should be deploy in groups so that every node should know the information of every
other node .sensors can be pre-located even if sensors can be dropped from airplanes or scattered over an area
by hand (2009).Nodes are deployed in groups allow most nodes to communicate without generating any
location claims as long as they are able to directly send messages to at least one of their group members. This
simple idea allows us to significantly reduce the overhead of sending, receiving, and verifying location claims
[1]. Additionally, if we assume loose time synchronization for the sensors, we can allow nodes to accept
messages from any node that has been deployed within a small window of its expected deployment time.
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 94 | Page
2.4 Real Time Clone Detection
In 2008 K. Xing, F. Liu, X. Cheng, and H.C. Du proposed the scheme clone attack detection in
wireless sensor network. In this scheme a social fingerprint is computed for each sensor by using the
neighborhood characteristics, and checks the legitimacy of the originator for each message by checking the
enclosed fingerprint. Generation of fingerprint is depends on the superimposed s-disjunct code, which incurs a
incredibly illumination communication and computation overhead. The checking of fingerprint is conducted at
both the base station as well as the nearby sensors, which ensures high detection likelihood. It also provides the
real time clone detection in efficient as well as effective way. Unlimited clones were deploying by capturing and
compromise nodes [3]. These nodes can be involve such as that of legitimate node and have access the
legitimate IDs and keys .If these remains inside the network and left undetected then the network get unshielded
to attackers and clone attackers are spread over the entire network. Smart clone may try to hide from being
detected by all means. So far they may collude to cheat the network administrator into believing that they are
legitimate. Clone node may be serving by adversary in the network at anywhere.
III. Proposed Work
3.1 System Architecture
Every time a mobile sensor node moves to a novel location, each of its neighbors asks for a signed
claim containing its location and time information and decides probabilistically whether to forward the received
claim to the base station or not as shown in Figure 3.1.
Figure 3.1: System Architecture
The base station computes the rate from every two consecutive claims of a mobile node and performs
the sequential probability ratio test (SPRT) by considering speed as an observed sample. There is little benefit to
the attacker of having a replica node in the same area as another compromised node. The compromised node can
straightly report fake data, participate in local control protocol. Algorithm used for the proposed scheme is:
Step 1: Let the number of Nodes be n, current_locationbe L and current_time be T
Step 2: If Node n>0, compute speed for current_location L1, current_time T1 (n) and previous_location L0 and
previous time T0 (n)
Step 3: If speed >Vmax, then replica detected
Step 4: Else accept test and terminate
Step 5: Prev_loc=cur_loc
Prev_time = cur_time
Step6: Else go to step2
The flow of data for proposed scheme is shown in Figure 3.2.
Each time a mobile sensor node u moves to a new location, Lu represents the location of node u and then
discovers a set of nearby nodes N (u). Each neighboring node v ∈ N (u) asks for a true location claim from node
u by sending its current time T to node u.After receiving T, node u checks whether T is valid or not. If yes then
it proceed towards the location detection and finally it monitor the nodes.
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 95 | Page
Figure 3.2: Data Flow for Proposed Work
3.2 Formulation for replica node detection and revocation
On receiving a location claim from node u, the base station verifies the authenticity of the claim with
the public key of u and discards the claim if it is not genuine. We indicate the genuine claims from node u by
C1
u, C2
u,…, Cn
u.. The base station extracts location information Li
u and time information Ti from claim Ci
u. Let di
denote the euclidean distance from location Li
u at time Ti to Li+1
u at Ti+1
. Let 0i denote the measured speed at time
Ti+1, where i=1, 2,…, n.
0i =
di
│Ti+1−Ti│
………………… (1)
Let Si denotes a Bernoulli random variable defined as
S=
0 if0i ≤ Vmax
1if 0i > Vmax
………………… (2)
Then, the success probability λ of the Bernouli distribution is
Pr si = 1 = 1 − Pr si = 0 = λ … … … … … (3)
Also the log–probability ratio on η samples which is given by
Ln = ln pr S1…..,Sn│ H1
pr S1…..,Sn│ H0
……………………… (4)
If Si is independent and identically distributed, then Ln can be rewritten as
Ln = ln
Π
i=1pr Si H1
n
Π
i=1pr Si H0
n = ln
P
r Si H1
Pr Si H0
n
i …………… (5)
Letωn denote the number of times that Si =1 in the n samples, we contain
Ln = ωnln
λ1
λ0
+ n − ωn ln 1−λ 1
1−λ 0
…………… (6)
Whereλ0 = Pr Si = 1 H0
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 96 | Page
The λ0 must be configured in accord with the possibility of the occurrence that a kindly node’s
measured speed exceeds Vmaxdue to time synchronization and localization errors. On the other hand,λ1should
be configured to consider the possibility of the occurrence that replica nodes measured speeds exceedsVmax.
While the former possibility is lower than the latter one, λ0should be set lower thanλ1.
IV. Conclusion
The Proposed replica node detection scheme for mobile sensor network is based on the sequential
probability ratio test. It can limit the amount of time for which a group of replicas can avoid detection and
quarantine. Proposed model also contain interaction between the detector and the adversary. The proposed
replica node detection with sequential hypothesis testing in wireless sensor networks can quickly detect mobile
replica nodes as compared to existing techniques.
References
[1]. Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In Security
and Privacy, 2005 IEEE Symposium on, pp. 49-63. IEEE, 2005.
[2]. Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol
for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium
on Mobile ad hoc networking and computing, pp. 80-89.ACM, 2007.
[3]. Xing, Kai, Fang Liu, Xiuzhen Cheng, and David Hung-Chang Du. "Real-time detection of clone attacks inwireless sensor
networks." In Distributed Computing Systems, 2008.ICDCS'08. The 28th International Conference on, pp. 3-10. IEEE, 2008.
[4]. Wald, Abraham. Sequential analysis. Courier Corporation, 1973.
[5]. Jung, Jaeyeon, Vern Paxson, Arthur W. Berger, and HariBalakrishnan. "Fast portscan detection using sequential hypothesis testing."
In Security and Privacy, 2004.Proceedings. 2004 IEEE Symposium on, pp. 211-225. IEEE, 2004.
[6]. Sundararaman, Bharath, Ugo Buy, and Ajay D. Kshemkalyani. "Clock synchronization for wireless sensor networks: a survey." Ad
Hoc Networks 3, no. 3 (2005): 281-323.
[7]. Song, Hui, Sencun Zhu, and Guohong Cao. "Attack-resilient time synchronization for wireless sensor networks."Ad Hoc Networks
5, no. 1 (2007): 112-125.
[8]. Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in
Communications Networks and the Workshops, 2007.SecureComm 2007. Third International Conference on, pp. 341-350. IEEE,
2007.

More Related Content

What's hot

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall forijistjournal
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 

What's hot (17)

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall for
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 

Viewers also liked

Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...
Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...
Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...Francesco Occhioni
 
Fa27 Food Waste updated
Fa27 Food Waste updatedFa27 Food Waste updated
Fa27 Food Waste updatedkresge419
 
L’avaluació de la competència digital docent
L’avaluació de la competència digital docentL’avaluació de la competència digital docent
L’avaluació de la competència digital docentARGET URV
 
Tecnodiario y sus aportes a la educación moderna
Tecnodiario y sus aportes a la educación modernaTecnodiario y sus aportes a la educación moderna
Tecnodiario y sus aportes a la educación modernaUNED
 
Presentacion de la nfl
Presentacion de la nflPresentacion de la nfl
Presentacion de la nfldanymoraXD
 
NJ Future Redevelopment Forum 2017 Reigniting Stalled Projects
NJ Future Redevelopment Forum 2017 Reigniting Stalled ProjectsNJ Future Redevelopment Forum 2017 Reigniting Stalled Projects
NJ Future Redevelopment Forum 2017 Reigniting Stalled ProjectsNew Jersey Future
 

Viewers also liked (13)

Flyer mario 2
Flyer mario 2Flyer mario 2
Flyer mario 2
 
Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...
Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...
Predizione di malfunzionamenti in reti di telecomunicazioni con tecniche di m...
 
Ecología
EcologíaEcología
Ecología
 
Fa27 Food Waste updated
Fa27 Food Waste updatedFa27 Food Waste updated
Fa27 Food Waste updated
 
L’avaluació de la competència digital docent
L’avaluació de la competència digital docentL’avaluació de la competència digital docent
L’avaluació de la competència digital docent
 
H012615560
H012615560H012615560
H012615560
 
E012463336
E012463336E012463336
E012463336
 
J1303057185
J1303057185J1303057185
J1303057185
 
Tecnodiario y sus aportes a la educación moderna
Tecnodiario y sus aportes a la educación modernaTecnodiario y sus aportes a la educación moderna
Tecnodiario y sus aportes a la educación moderna
 
U01226132138
U01226132138U01226132138
U01226132138
 
Presentacion de la nfl
Presentacion de la nflPresentacion de la nfl
Presentacion de la nfl
 
Juegos olimpicos
Juegos olimpicosJuegos olimpicos
Juegos olimpicos
 
NJ Future Redevelopment Forum 2017 Reigniting Stalled Projects
NJ Future Redevelopment Forum 2017 Reigniting Stalled ProjectsNJ Future Redevelopment Forum 2017 Reigniting Stalled Projects
NJ Future Redevelopment Forum 2017 Reigniting Stalled Projects
 

Similar to P017129296

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 

Similar to P017129296 (20)

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
18
1818
18
 
O010528791
O010528791O010528791
O010528791
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
D0952126
D0952126D0952126
D0952126
 
B43040610
B43040610B43040610
B43040610
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

P017129296

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 92-96 www.iosrjournals.org DOI: 10.9790/0661-17129296 www.iosrjournals.org 92 | Page Detection of Replica Nodes in Wireless Sensor Network: A Survey Sandip D. Girase1 , Ashish T. Bhole2 1,2 Department of Computer Engineering, SSBT’s College Of Engineering & Technology, Jalgaon, Maharashtra, India Abstract: Network security has become a challenging area, historically only tackled by well qualified and familiar experts. Although more pupils are becoming wired, an increasing number of pupils need to understand basics of security in the network world. The paper is written from the prospective of the basic computer user and information systems administrator, illuminating the concepts needed to go through the hype in the marketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allow the attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work on replica node recognition relies on set sensor locations and hence do not work in mobile sensor network. The paper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to the sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can result in a fast and effective detection of mobile replica nodes within wireless sensor network. Keywords: Wireless sensor network (WSN), network security, attack detection, node replication, tamper resistant hardware, sequential probability ratio test (SPRT) I. Introduction Now a day’s robotics have the advances which is responsible for developing several [1] architecture for autonomous wireless sensor networks. This unattended nature of wireless sensor networks can be exploited by adversaries. The adversaries takes the secret keying materials from a compromised node, generates a huge amount of attacker-controlled replicas that share the node’s keying resources and ID, and then spreads these replicas right through the network. With a particular captured node, the adversary can form as many replica nodes as he has the hardware to generate [8]. One of the solutions for this is the use of tamper-resistance hardware to prevent adversary from extracting the keying material. 1.1 Tamper–resistant hardware For protecting the keys the appropriate way is to store them in a tamper-resistant hardware tool. Such devices can be used for applications ranging from safe e-mail to electronic cash and credit cards. They suggest substantial shield to the keys residing within them, thus providing a few guarantee that these keys have not been maliciously read or modified. Typically in advance access to the contents of a tamper-resistant device requires knowledge of a PIN or password exactly what type of access can be gained with this knowledge is device dependent. 1.2 Sequential hypothesis test The sequential hypothesis testing is statistical analysis where the sample size is not set in progress. as a replacement for data are evaluate as they are collected, and additional sampling is stopped in accordance with a pre-defined stopping rule as soon as significant results are observed. as a result a climax may sometimes be reached at a much earlier stage than would be possible with more classical hypothesis testing or estimation, at consequently lower financial and or individual cost. 1.3 Sequential probability ratio test The sequential probability ratio test (SPRT) is a specific [4] sequential hypothesis test which is developed for use in quality control studies in the realm of mechanized, SPRT have been formulate used for use in the computerized testing of human examinees as a termination criterion .It is nothing but a statistical hypothesis test which is a method of making decision by means of data, whether commencing a forbidden experimentation or an observational lessons. In information, a result is called statistically significant if it is unlikely to have occurred by probability alone, according to a fixed threshold probability, the significance level. These tests are used in determining what outcomes of an experiment would lead to a rejection of the null hypothesis for a pre-specified level of significance helping to decide whether experimental results contain enough information to cast doubt on conventional wisdom. It is occasionally called assenting data investigation, in difference to investigative data analysis. Statistical hypothesis testing is a key technique of frequents
  • 2. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 93 | Page statistical inference. The critical region of a hypothesis test is the set of all outcomes which cause the null hypothesis to be rejected in support of the alternative hypothesis. 1.4 Null hypothesis The null hypothesis is nothing but a typically corresponds to a general or default position Null hypothesis is typically paired with a subsequent assumption, the substitute hypothesis, which assert a particular relationship between the phenomena. The substitute need not be the reasonable negation of the null hypothesis it predicts the results from the experiment if the substitute assumption is true. The use of substitute hypotheses was not part of Fisher's formulation, but became standard. It is important to understand that the null hypothesis can never be expanded beyond the doubt. A set of data can only reject a null hypothesis or fail to reject it. For instance, if similarity of two groups. Null hypothesis can be work by collecting data and measuring how likely the particular set of data is, assuming the null hypothesis is true. The null hypothesis (H0) choice and consideration of directionality is critical. 1.5 Alternative hypothesis The alternative hypothesis (or maintained hypothesis or research hypothesis and the null hypothesis are the two rival hypotheses which are compared by a statistical hypothesis test. Sequential probability is a statistical decision process. It consists of one dimensional random walk with lower and upper limit [5]. A random walk is a mathematical formalization of a path which consists of a succession of random steps. II. Related Work 2.1 Attack Resilient Time Synchronization in Wireless Sensor Network In 2006, H. Song, S. Zhu, and G. Cao the time synchronization in wireless sensor network for attack resilient. In the sensor network application required time to be synchronized within the network [7]. For instance the applications include mobile object tracking, data aggregation, TDMA radio arrangement, and message ordering, to name a few. a sensor network is deployed in an area of interest to monitor passing objects which is the application of mobile object tracking. The detecting nodes record the detecting location and the detecting time, object is papering. Later, these location and time information are sent to the aggregation node which estimates the moving trajectory of the object [6]. Without accurate time synchronization, the estimated trajectory of the tracked object could differ greatly from the actual one. It also covers the network time synchronization method relay on message exchange between the nodes. Paper also gives important on the receiver –receiver model reference broadcast synchronization scheme (RBS) and its prototypes are used. 2.2 A Randomized, Efficient and Distributed Protocol In 2007, M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, discovered the RED protocol for detection of replication attack in wireless sensor network. The randomized, efficient and distributed protocol is highly efficient as compared to other distributed protocol in the sense of communication, memory and computation [2]. In this every claim message of node is signed with its private key ,which allows other nodes to identify any malicious node not abiding to the protocol .It also allows adversary to know the witness set for any given ID. But the witness of the node will be any were in the network and it change at every protocol iteration I unpredicted way .In order to prevent RED from detecting the replicas it is required to be ubiquitous and to capture all the witness of the cloned nodes within a window period which can be at most share among the disclosure of rand and next protocol invocation. By considering adversary movement speed and realistic network size, it admires that few chances for the adversary to perform the same attack. RED performs the requirement that are area-obliviousness, ID-obliviousness ,low overhead, over head balancing and high replica attack detection probability .Consider the simulation in that n=1,000 nodes in the network, r=0.1 communication radius, g=1 and p=0.1 for the red protocol. 2.3 Distributed Detection of Node Attacks with Deployment Knowledge The idea behind the scheme is to have nodes report location claims, which identify their positions and attempt to detect conflicting information that single one node in more than one location. For this, every node should have location claims and verify and store signed location claims of every other node .It gives the idea behind it that every node should be deploy in groups so that every node should know the information of every other node .sensors can be pre-located even if sensors can be dropped from airplanes or scattered over an area by hand (2009).Nodes are deployed in groups allow most nodes to communicate without generating any location claims as long as they are able to directly send messages to at least one of their group members. This simple idea allows us to significantly reduce the overhead of sending, receiving, and verifying location claims [1]. Additionally, if we assume loose time synchronization for the sensors, we can allow nodes to accept messages from any node that has been deployed within a small window of its expected deployment time.
  • 3. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 94 | Page 2.4 Real Time Clone Detection In 2008 K. Xing, F. Liu, X. Cheng, and H.C. Du proposed the scheme clone attack detection in wireless sensor network. In this scheme a social fingerprint is computed for each sensor by using the neighborhood characteristics, and checks the legitimacy of the originator for each message by checking the enclosed fingerprint. Generation of fingerprint is depends on the superimposed s-disjunct code, which incurs a incredibly illumination communication and computation overhead. The checking of fingerprint is conducted at both the base station as well as the nearby sensors, which ensures high detection likelihood. It also provides the real time clone detection in efficient as well as effective way. Unlimited clones were deploying by capturing and compromise nodes [3]. These nodes can be involve such as that of legitimate node and have access the legitimate IDs and keys .If these remains inside the network and left undetected then the network get unshielded to attackers and clone attackers are spread over the entire network. Smart clone may try to hide from being detected by all means. So far they may collude to cheat the network administrator into believing that they are legitimate. Clone node may be serving by adversary in the network at anywhere. III. Proposed Work 3.1 System Architecture Every time a mobile sensor node moves to a novel location, each of its neighbors asks for a signed claim containing its location and time information and decides probabilistically whether to forward the received claim to the base station or not as shown in Figure 3.1. Figure 3.1: System Architecture The base station computes the rate from every two consecutive claims of a mobile node and performs the sequential probability ratio test (SPRT) by considering speed as an observed sample. There is little benefit to the attacker of having a replica node in the same area as another compromised node. The compromised node can straightly report fake data, participate in local control protocol. Algorithm used for the proposed scheme is: Step 1: Let the number of Nodes be n, current_locationbe L and current_time be T Step 2: If Node n>0, compute speed for current_location L1, current_time T1 (n) and previous_location L0 and previous time T0 (n) Step 3: If speed >Vmax, then replica detected Step 4: Else accept test and terminate Step 5: Prev_loc=cur_loc Prev_time = cur_time Step6: Else go to step2 The flow of data for proposed scheme is shown in Figure 3.2. Each time a mobile sensor node u moves to a new location, Lu represents the location of node u and then discovers a set of nearby nodes N (u). Each neighboring node v ∈ N (u) asks for a true location claim from node u by sending its current time T to node u.After receiving T, node u checks whether T is valid or not. If yes then it proceed towards the location detection and finally it monitor the nodes.
  • 4. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 95 | Page Figure 3.2: Data Flow for Proposed Work 3.2 Formulation for replica node detection and revocation On receiving a location claim from node u, the base station verifies the authenticity of the claim with the public key of u and discards the claim if it is not genuine. We indicate the genuine claims from node u by C1 u, C2 u,…, Cn u.. The base station extracts location information Li u and time information Ti from claim Ci u. Let di denote the euclidean distance from location Li u at time Ti to Li+1 u at Ti+1 . Let 0i denote the measured speed at time Ti+1, where i=1, 2,…, n. 0i = di │Ti+1−Ti│ ………………… (1) Let Si denotes a Bernoulli random variable defined as S= 0 if0i ≤ Vmax 1if 0i > Vmax ………………… (2) Then, the success probability λ of the Bernouli distribution is Pr si = 1 = 1 − Pr si = 0 = λ … … … … … (3) Also the log–probability ratio on η samples which is given by Ln = ln pr S1…..,Sn│ H1 pr S1…..,Sn│ H0 ……………………… (4) If Si is independent and identically distributed, then Ln can be rewritten as Ln = ln Π i=1pr Si H1 n Π i=1pr Si H0 n = ln P r Si H1 Pr Si H0 n i …………… (5) Letωn denote the number of times that Si =1 in the n samples, we contain Ln = ωnln λ1 λ0 + n − ωn ln 1−λ 1 1−λ 0 …………… (6) Whereλ0 = Pr Si = 1 H0
  • 5. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 96 | Page The λ0 must be configured in accord with the possibility of the occurrence that a kindly node’s measured speed exceeds Vmaxdue to time synchronization and localization errors. On the other hand,λ1should be configured to consider the possibility of the occurrence that replica nodes measured speeds exceedsVmax. While the former possibility is lower than the latter one, λ0should be set lower thanλ1. IV. Conclusion The Proposed replica node detection scheme for mobile sensor network is based on the sequential probability ratio test. It can limit the amount of time for which a group of replicas can avoid detection and quarantine. Proposed model also contain interaction between the detector and the adversary. The proposed replica node detection with sequential hypothesis testing in wireless sensor networks can quickly detect mobile replica nodes as compared to existing techniques. References [1]. Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In Security and Privacy, 2005 IEEE Symposium on, pp. 49-63. IEEE, 2005. [2]. Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 80-89.ACM, 2007. [3]. Xing, Kai, Fang Liu, Xiuzhen Cheng, and David Hung-Chang Du. "Real-time detection of clone attacks inwireless sensor networks." In Distributed Computing Systems, 2008.ICDCS'08. The 28th International Conference on, pp. 3-10. IEEE, 2008. [4]. Wald, Abraham. Sequential analysis. Courier Corporation, 1973. [5]. Jung, Jaeyeon, Vern Paxson, Arthur W. Berger, and HariBalakrishnan. "Fast portscan detection using sequential hypothesis testing." In Security and Privacy, 2004.Proceedings. 2004 IEEE Symposium on, pp. 211-225. IEEE, 2004. [6]. Sundararaman, Bharath, Ugo Buy, and Ajay D. Kshemkalyani. "Clock synchronization for wireless sensor networks: a survey." Ad Hoc Networks 3, no. 3 (2005): 281-323. [7]. Song, Hui, Sencun Zhu, and Guohong Cao. "Attack-resilient time synchronization for wireless sensor networks."Ad Hoc Networks 5, no. 1 (2007): 112-125. [8]. Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in Communications Networks and the Workshops, 2007.SecureComm 2007. Third International Conference on, pp. 341-350. IEEE, 2007.