SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 99 – 102
_______________________________________________________________________________________________
99
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Clone Node Detection in Wireless Sensor Networks
K.Anitha1
(Research scholar),
Dept. of Computer Science,
Tamil University,
Thanjavur, Tamil Nadu, India.
e-mail : anithameerak@gmail.com
A.Senthilkumar2
(Asst. Professor),
Dept. of Computer Science,
Tamil University,
Thanjavur Tamil Nadu, India.
e-mail : erodesenthilkumar@gmail.com
Abstract: Wireless Sensor Networks (WSNs) are often deployed in unfavourable situations where an assailant can physically capture some of
the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. This replication
node is also called as Clone node. The clone node or replicated node behave as a genuine node. It can damage the network. In node replication
attack detecting the clone node important issue in Wireless Sensor Networks. A few distributed solutions have been recently proposed, but they
are not satisfactory. First, they are intensity and memory demanding: A serious drawback for any protocol to be used in the WSN- resource
constrained environment. In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection
methodologies, deployment strategies, and detection ranges. Further, they are vulnerable to the specific assailant models introduced in this
paper. In this scenario, a particularly dangerous attack is the replica attack, in which the assailant takes the secret keying materials from a
compromised node, generates a large number of assailant-controlled replicas that share the node’s keying materials and ID, and then spreads
these replicas throughout the network. With a single captured node, the assailant can create as many replica nodes as he has the hardware to
generate.. The replica nodes are controlled by the assailant, but have keying materials that allow them to seem like authorized participants in the
network.
Our implementation specifies, user will specify its ID, which means client id, secret key will be create, and then include the port
number. The witness node will verify the internally bounded user Id and secret key. The witness node means original node. If the verification is
success, the information collecting to the packets that packets are send to the destination.
Keywords: Static WSN , Distributed mechanism, Node replication Attacks, Sequential probability ratio test.
__________________________________________________*****_________________________________________________
I INTRODUCTION
In wireless sensor networks, sensor nodes are
deployed in unattended environment and there is no
security. An attacker can easily capture and compromise
sensor node and make replicas of them. The replicas nodes
are duplicate nodes which are created by an adversary make
many replica nodes all having same ID and these replica
nodes[1] are controlled by an adversary. Then these fake
data are injected into a network which may cause eaves
dropping in network communication. The fake data disrupt
the network operations in network communication. Several
replica node detection schemes[2] have been proposed to
defend against in static sensor network and they do not work
well in mobile sensor networks where sensors are expected
to move.
To detect replica node in mobile sensor network,[3]
the proposed system use a new technique called Sequential
Probability Ratio Testing (SPRT). The uncompromised
mobile node should never move at the speed in excess of
system configured maximum speed. The compromised
mobile node measured speeds will be maximum then the
system configured speed because two or more nodes with
the same identity are present in the network. If the system
decides that a node has been replicated based on a single
observation, the nodes moving faster than the system
configuration speed many false positive errors occurred in
speed measurement. If the system decides that a node is
benign based on the single observation, the node moving
less than the system configuration speed now the high false
negative rates occurred. To minimize these false positive
and false negative rates, SPRT a hypothesis testing method
is used. That can make decisions quickly and accurately.
SPRT is performed on every mobile node using null
hypothesis the mobile node has not been replicated and in
alternate hypothesis that it has been replicated. Once the
alternate hypothesis is accepted the replica nodes will be
revoked from the network.
Detection of Replica Node
Replica node attack is a dangerous because they
allow the attacker to leverage the compromise of few nodes
to exert control over much of network. In static sensor
networks replica node detection scheme works well, because
the nodes are static so it is possible to detect
the additional node which has the same sensor node
ID. In mobile sensor networks it is difficult to detect which
node is replica because all the nodes are dynamic.
In replica node attack, an adversary may capture
the node and take the data into his own sensor. Then he
deploys those sensors in to the network for various
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 99 – 102
_______________________________________________________________________________________________
100
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
malicious activities. Replica node attack is a dangerous one
since all the replica are having legitimate keys which makes
the replica to be an benign node since there is no difference
between the benign node and replica in terms of their
authentication it is difficult to detect replica. Once the node
is compromised the information get leaked adversary may
inject false data on the node or modifying the data which is
passed between the nodes. So finding the replica node is an
important one for protecting the network from various
attacks. Protection of sensor networks can be done in two
ways: both centralized and distributed approaches are
needed and also needed for static sensor networks and
wireless sensor networks.
Several replica node detection schemes have been
proposed for wireless sensor networks. The primary method
used by the majority of these schemes is to have nodes
report location claims that identify their positions and
attempt to detect colliding reports that indicate one node in
multiple locations. Since this method leverages the location
information for replica detection, it cannot work without the
help of secure localization or GPS techniques. If could
detect replicas without the aid of these techniques, we would
save the detection costs subject to employing these
techniques.
Indeed could detect replicas without the use of
location information in case of replica cluster attacks, in
which multiple replicas of a single compromised node form
a cluster in such a way that they are placed close to each
other in the cluster. Specifically, in replica cluster attacks,
multiple replicas with the same identity and secret keying
materials are placed in the same small regions. All of these
replicas want to maximize their malicious impact on the
network and thus communicate with as many nodes as
possible at the same time. Accordingly, it is highly likely
that the number of nodes with which these replicas would
communicate at a time would be much more than the one of
their benign neighbors. By leveraging this intuition, every
node performs the Sequential Probability Ratio Test (SPRT)
on its neighbor node using a null hypothesis that a replica
cluster of the neighbor node does not exist and an alternate
hypothesis that a replica cluster of the neighbor node exists.
In using the SPRT, if the number of communication peers of
a neighbor node falls short of or exceeds a pre-configured
threshold, it will lead to acceptance of the null or alternate
hypotheses, respectively. Once the alternate hypothesis is
accepted, the node will disconnect the communication with
the neighbor node.
PROBLEM DESCRIPTION
Wireless Sensor Networks (WSNs), and
particularly their security issues, have received great
attention recently in both academia and industry. Since tiny
sensor nodes in WSNs have meagre resources for
computation, communication, power, and storage, it is
challenging to provide efficient security functions and
mechanisms for WSNs. Above all, since WSNs are
frequently deployed in hostile environments, sensor nodes
can be captured and compromised easily by an adversary
who may extract secret information from the captured
nodes. After such a compromise, a clone attack can be
launched by replicating the captured nodes and injecting
them sporadically over the networks such that the adversary
can enlarge the compromised areas by employing the clones.
The secret information, such as access keys, extracted from
the captured nodes and still contained in clones, may allow
the adversary to gain access to communication systems
throughout WSNs. For instance, clones would be
authenticated as genuine nodes in a key establishment
scheme of WSNs in different locations, eventually taking
over a local segment or an entire network to launch various
attacks, such as corrupting data aggregation, injecting false
data, and dropping packets selectively. Thus, it is essential
to detect clone nodes promptly for minimizing their
damages to WSNs.
In wireless sensor networks, sensor nodes are
deployed in unattended environment and there is no
security. An attacker can easily capture and compromise
sensor node and make replicas of them. The replicas nodes
are duplicate nodes which are created by an adversary make
many replica nodes all having same ID and these replica
nodes are controlled by an adversary. Then these fake data
are injected into a network which may cause eaves dropping
in network communication. The fake data disrupt the
network operations in network communication. Several
replica node detection schemes have been proposed to
defend against in static sensor network and they do not work
well in mobile sensor networks where sensors are expected
to move.
The simplest defensive measure against the clone
attacks is to prevent an adversary from extracting secret key
materials from captured nodes by virtue of tamper-resistant
hardware. However, the hardware-based defensive measures
are too expensive to be practical for resource-restricted
sensor nodes. Various kinds of software-based clone
detection schemes have recently been proposed for WSNs,
considering many different types of network configuration,
such as device types and deployment strategies. The
limitation of software based clone detection schemes is
undoubtedly that they are not generic, meaning that their
performance and effectiveness may depend upon their
preconfigured network settings. For example, a clone
detection scheme designed for mobile WSNs is useless in
static WSNs. In order to choose an effective detection
scheme for a certain sensor network, it is desirable to have a
set of well-designed selection criteria.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 99 – 102
_______________________________________________________________________________________________
101
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
In this project first investigate the selection criteria
of clone detection schemes with regard to device types,
detection methodologies, deployment strategies and
detection ranges, and then classify the existing schemes
according to the proposed criteria. First, divide static and
mobile sensors according to their mobility. A static sensor
node cannot move, while the location of a mobile sensor
changes depending on operational scenarios. Clone
detection strategies can be classified in this sense as well.
Second, classify the detection schemes to centralized and
distributed schemes[4], i.e., in terms of the ways to collect
and verify evidence of clones. One is that a central node,
such as a base station (BS), acts solely on detecting clones,
and the other is that a group of sensor nodes conduct the
clone detection cooperatively. Third, according to the ways
how to deploy sensor nodes divide them into random
uniform deployment and grid deployment strategies. The
former is that sensor nodes are scattered in a region
randomly, and the latter works in a way that they are placed
in prescheduled zones by dividing a given deployment field
into a number of practical location zones. Finally, according
to clone detection locations, divide the schemes into whole
area and local area detection schemes. In the former
schemes, all sensor nodes work jointly in detecting clones,
but in the latter schemes only a subset of them will conduct
it locally.
To summarize, classify the existing clone detection
schemes based on the following criteria:
1) Device type: static (sensor) versus mobile (sensor);
2) Detection method: centralized (detection) versus
distributed (detection);
3) Deployment strategy: random uniform (deployment)
versus grid (deployment);
4) Detection range: whole (area detection) versus local (area
detection).
II SYSTEM ANALYSIS
EXISTING SYSTEM
The Existed schemes rely only on fixed sensor
locations in static sensor networks. A particularly dangerous
attack is the replica node attack, in which the adversary
takes the secret keying materials from a compromised node.
The adversary can generates a large number of attacker-
controlled replicas that share the compromised node’s
keying materials and ID, and then spreads these replicas
throughout the network. For detecting replica node attacks is
due to randomized and line selected multicast schemes to
detect replicas in static wireless sensor networks.
 DEMERITS
 The locally generated outgoing messages in a
network normally cannot provide the aggregate
large-scale spam view required by these
approaches.
 Outgoing messages gives rise to the sequential
detection problem.
 Blocking policy is not adopted.
PROPOSED SYSTEM
It proposes a fast and effective replica node
detection schema using the sequential probability ratio test.
The sensor node is compare it to a predefine threshold, if it
is more than threshold value, we decide the sensor node has
a captured nodes. This simple approach achievers efficient
node captures detection capability as long as a threshold
value is properly configured. However, it is not easy to
configure a proper a threshold value to detect captured
nodes. If set threshold to a high value it is likely that
captured nodes bypass the detection. On the contrary if we
set threshold to a low value, it is likely that benign nodes
can be detected as a captured nodes. It uses scheme for
distributed detection of mobile malicious node attacks in
mobile sensor networks. The key idea of this scheme is to
apply sequential hypothesis testing[5] to discover nodes that
are silent for unusually many time periods such nodes are
likely to be moving and block them from communicating.
To design an effective, fast, and robust replica
detection scheme specifically for mobile sensor networks.
For the effective scheme a novel mobile replica detection
scheme based on the Sequential Probability Ratio Test
(SPRT)[6]. By using the fact that an uncompromised mobile
node should never move at speeds in excess of the system-
configured maximum speed. Also through quarantine
analysis that the amount of time, during a given time slot,
that the replicas can impact the network is very limited.
 MERITS
 To minimize these false positives and false
negatives apply the SPRT.
 That can make decisions quickly and
accurately.
 It is an effective, fast, and robust replica
detection scheme specifically for mobile
sensor networks.
III MODULE DESCRIPTION
 Duplicate Node Detection
 Centralized Detection
 Local Detection
 Node-To-Network Broadcasting
 Probabilistic Failure Detection
 Detecting Replicas
3.1 Duplicate Node Detection
The nodes which are captured by an adversary can
compromise the sensor nodes and make many replicas of
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 99 – 102
_______________________________________________________________________________________________
102
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
them. These compromised nodes all have the same ID are
present in the network. To understand the dangers of node
compromise must first define what we mean by node
compromise. Node compromise occurs when an attacker,
though some subvert means, gains control of a node in the
network after deployment. Once in control of that node, the
attacker can alter the node to listen to information in the
network, input malicious data[7], cause DOS, black hole, or
any one of a myriad of attacks on the network. The attacker
may also simply extract information vital to the network’s
security such as routing protocols, data, and security keys.
Generally compromise occurs once an attacker has found a
node, and then directly connects the node to their computer
via a wired connection of some sort. Once connected the
attacker controls the node by extracting the data and/or
putting new data or controls on that node.
3.2 Centralized Detection
The most straightforward detection scheme
requires each node to send a list of its neighbors and their
claimed locations to the base station. The base station can
then examine every neighbor list to look for replicated
nodes. If it discovers one or more replicas, it can revoke the
replicated nodes by flooding the network with an
authenticated revocation message.
3.3 Local Detection
To avoid relying on a central base station could
instead rely on a node’s neighbors to perform replication
detection. Using a voting mechanism, the neighbors can
reach a consensus on the legitimacy of a given node.
Unfortunately, while achieving detection in a distributed
fashion, this method fails to detect distributed node
replication in disjoint neighbourhoods within the network.
As long as the replicated nodes are at least two hops away
from each other, a purely local approach cannot succeed.
3.4 Node-To-Network Broadcasting
One approach to distributed detection utilizes a
simple broadcast protocol. Essentially, each node in the
network uses an authenticated broadcast message to flood
the network with its location information. Each node stores
the location information for its neighbors and if it receives a
conflicting claim, revokes the offending node.
3.5 Probabilistic Failure Detection
In this section describe in detail the Protector
probabilistic replica maintenance approach, and analyze its
effectiveness. It begins by first describing the high level
replica maintenance problem as context. Then describe the
Protector approach in detail, and prove that its estimate on
the number of remaining replicas is the most accurate.
Finally describe in detail how to derive Protector’s failure
probability function[8] through both a Markov failure model
and extraction from measurement traces of failure events.
3.6 Detecting Replicas
Unlike the Random Multicast and Line-Selected
Multicast algorithms,[9] where the nodes storing the copies
of a location claim are chosen randomly from the whole
network, in Software Defined Concern (SDC) such nodes
are chosen randomly from a small subset of all the nodes in
the network, i.e., the nodes in the destination cell determined
by the geographic hash function. In addition, since the
location claim will be flooded within the destination cell, the
SDC scheme can always detect any pair of nodes claiming
the same identity. In other words, pdr = 100% in SDC, when
r > 0 and w > 0.
IV CONCLUTION
The concludes detection of mobile replica node
attacks in mobile sensor networks using speed measurement
testing. Several replica node detection schemes have been
proposed in the literature to defend against such attacks in
static sensor networks. In this work, a fast and effective
mobile replica node detection scheme using the Sequential
hypothesis testing.
V FUTURE ENHANCEMENT
Finally some open issues have been identified that
are left as future. This proposed system at the time several
nodes are detected. But in this future work to increase the
detection level.
REFERENCES
[1] Ambiritha M.A, Gomathi V “Efficient Node Replica Detection In
Wireless Sensor Networks”2008.
[2] ChakibBekara and Maryline Laurent-Maknavicius“Defending
Against Nodes Replication Attacks on Wireless Sensor
Networks”2010.
[3] Dr.Chellappan..CandManjula.V,”Replication Attack Mitigations
for Static and Mobile Wireless sensor networks”1999.
[4] jun-won ho, “Distributed Detection Of Replicas With Deployment
Knowledge In Wireless Sensor Networks”2007.
[5] Jun-Won Ho,“Sequential Hypothesis Testing Based Approach for
Replica Cluster Detection in Wireless Sensor Networks”2010.
[6] Jun-Won Ho, Matthew Wright “Fast Detection of Mobile Replica
Node Attacks in Sensor Networks Using Sequential Hypothesis
Testing” IEEE 2011.
[7] Pavithraa.S,Balakrishnan.C “Fake Data Termination in Wireless
Sensor Networks” International Journal of Recent Technology and
Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-2, June
2012.
[8] Liang-Min Wang, and Yang Shi “Patrol Detection for Replica
Attacks on Wireless Sensor Networks”2011.
[9] Conti et al. In their work “A Randomized, Efficient, and
Distributed Protocol for the Detection of Node Replication Attacks
in Wireless Sensor Networks “ (2007).

More Related Content

What's hot

Efficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
Efficient Detection Of Selfish Node In Manet Using A Colloborative WatchdogEfficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
Efficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
IJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
eSAT Publishing House
 
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
AM Publications,India
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
Finalyear Projects
 
C0363012014
C0363012014C0363012014
C0363012014
inventionjournals
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
IJNSA Journal
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
IJECEIAES
 
O010528791
O010528791O010528791
O010528791
IOSR Journals
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
ijceronline
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
Alexander Decker
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
Ramesh Patriotic
 

What's hot (19)

Efficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
Efficient Detection Of Selfish Node In Manet Using A Colloborative WatchdogEfficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
Efficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
C0363012014
C0363012014C0363012014
C0363012014
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
O010528791
O010528791O010528791
O010528791
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 

Similar to Clone Node Detection in Wireless Sensor Networks

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
Editor IJCATR
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
IOSR Journals
 
P017129296
P017129296P017129296
P017129296
IOSR Journals
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
researcherchennai
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
eSAT Journals
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
eSAT Publishing House
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET Journal
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
ijtsrd
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
AM Publications
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Publishing House
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
ijtsrd
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
dbpublications
 

Similar to Clone Node Detection in Wireless Sensor Networks (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
 

Recently uploaded

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
AIRCC Publishing Corporation
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 

Recently uploaded (20)

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 

Clone Node Detection in Wireless Sensor Networks

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 99 – 102 _______________________________________________________________________________________________ 99 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Clone Node Detection in Wireless Sensor Networks K.Anitha1 (Research scholar), Dept. of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India. e-mail : anithameerak@gmail.com A.Senthilkumar2 (Asst. Professor), Dept. of Computer Science, Tamil University, Thanjavur Tamil Nadu, India. e-mail : erodesenthilkumar@gmail.com Abstract: Wireless Sensor Networks (WSNs) are often deployed in unfavourable situations where an assailant can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. This replication node is also called as Clone node. The clone node or replicated node behave as a genuine node. It can damage the network. In node replication attack detecting the clone node important issue in Wireless Sensor Networks. A few distributed solutions have been recently proposed, but they are not satisfactory. First, they are intensity and memory demanding: A serious drawback for any protocol to be used in the WSN- resource constrained environment. In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies, and detection ranges. Further, they are vulnerable to the specific assailant models introduced in this paper. In this scenario, a particularly dangerous attack is the replica attack, in which the assailant takes the secret keying materials from a compromised node, generates a large number of assailant-controlled replicas that share the node’s keying materials and ID, and then spreads these replicas throughout the network. With a single captured node, the assailant can create as many replica nodes as he has the hardware to generate.. The replica nodes are controlled by the assailant, but have keying materials that allow them to seem like authorized participants in the network. Our implementation specifies, user will specify its ID, which means client id, secret key will be create, and then include the port number. The witness node will verify the internally bounded user Id and secret key. The witness node means original node. If the verification is success, the information collecting to the packets that packets are send to the destination. Keywords: Static WSN , Distributed mechanism, Node replication Attacks, Sequential probability ratio test. __________________________________________________*****_________________________________________________ I INTRODUCTION In wireless sensor networks, sensor nodes are deployed in unattended environment and there is no security. An attacker can easily capture and compromise sensor node and make replicas of them. The replicas nodes are duplicate nodes which are created by an adversary make many replica nodes all having same ID and these replica nodes[1] are controlled by an adversary. Then these fake data are injected into a network which may cause eaves dropping in network communication. The fake data disrupt the network operations in network communication. Several replica node detection schemes[2] have been proposed to defend against in static sensor network and they do not work well in mobile sensor networks where sensors are expected to move. To detect replica node in mobile sensor network,[3] the proposed system use a new technique called Sequential Probability Ratio Testing (SPRT). The uncompromised mobile node should never move at the speed in excess of system configured maximum speed. The compromised mobile node measured speeds will be maximum then the system configured speed because two or more nodes with the same identity are present in the network. If the system decides that a node has been replicated based on a single observation, the nodes moving faster than the system configuration speed many false positive errors occurred in speed measurement. If the system decides that a node is benign based on the single observation, the node moving less than the system configuration speed now the high false negative rates occurred. To minimize these false positive and false negative rates, SPRT a hypothesis testing method is used. That can make decisions quickly and accurately. SPRT is performed on every mobile node using null hypothesis the mobile node has not been replicated and in alternate hypothesis that it has been replicated. Once the alternate hypothesis is accepted the replica nodes will be revoked from the network. Detection of Replica Node Replica node attack is a dangerous because they allow the attacker to leverage the compromise of few nodes to exert control over much of network. In static sensor networks replica node detection scheme works well, because the nodes are static so it is possible to detect the additional node which has the same sensor node ID. In mobile sensor networks it is difficult to detect which node is replica because all the nodes are dynamic. In replica node attack, an adversary may capture the node and take the data into his own sensor. Then he deploys those sensors in to the network for various
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 99 – 102 _______________________________________________________________________________________________ 100 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ malicious activities. Replica node attack is a dangerous one since all the replica are having legitimate keys which makes the replica to be an benign node since there is no difference between the benign node and replica in terms of their authentication it is difficult to detect replica. Once the node is compromised the information get leaked adversary may inject false data on the node or modifying the data which is passed between the nodes. So finding the replica node is an important one for protecting the network from various attacks. Protection of sensor networks can be done in two ways: both centralized and distributed approaches are needed and also needed for static sensor networks and wireless sensor networks. Several replica node detection schemes have been proposed for wireless sensor networks. The primary method used by the majority of these schemes is to have nodes report location claims that identify their positions and attempt to detect colliding reports that indicate one node in multiple locations. Since this method leverages the location information for replica detection, it cannot work without the help of secure localization or GPS techniques. If could detect replicas without the aid of these techniques, we would save the detection costs subject to employing these techniques. Indeed could detect replicas without the use of location information in case of replica cluster attacks, in which multiple replicas of a single compromised node form a cluster in such a way that they are placed close to each other in the cluster. Specifically, in replica cluster attacks, multiple replicas with the same identity and secret keying materials are placed in the same small regions. All of these replicas want to maximize their malicious impact on the network and thus communicate with as many nodes as possible at the same time. Accordingly, it is highly likely that the number of nodes with which these replicas would communicate at a time would be much more than the one of their benign neighbors. By leveraging this intuition, every node performs the Sequential Probability Ratio Test (SPRT) on its neighbor node using a null hypothesis that a replica cluster of the neighbor node does not exist and an alternate hypothesis that a replica cluster of the neighbor node exists. In using the SPRT, if the number of communication peers of a neighbor node falls short of or exceeds a pre-configured threshold, it will lead to acceptance of the null or alternate hypotheses, respectively. Once the alternate hypothesis is accepted, the node will disconnect the communication with the neighbor node. PROBLEM DESCRIPTION Wireless Sensor Networks (WSNs), and particularly their security issues, have received great attention recently in both academia and industry. Since tiny sensor nodes in WSNs have meagre resources for computation, communication, power, and storage, it is challenging to provide efficient security functions and mechanisms for WSNs. Above all, since WSNs are frequently deployed in hostile environments, sensor nodes can be captured and compromised easily by an adversary who may extract secret information from the captured nodes. After such a compromise, a clone attack can be launched by replicating the captured nodes and injecting them sporadically over the networks such that the adversary can enlarge the compromised areas by employing the clones. The secret information, such as access keys, extracted from the captured nodes and still contained in clones, may allow the adversary to gain access to communication systems throughout WSNs. For instance, clones would be authenticated as genuine nodes in a key establishment scheme of WSNs in different locations, eventually taking over a local segment or an entire network to launch various attacks, such as corrupting data aggregation, injecting false data, and dropping packets selectively. Thus, it is essential to detect clone nodes promptly for minimizing their damages to WSNs. In wireless sensor networks, sensor nodes are deployed in unattended environment and there is no security. An attacker can easily capture and compromise sensor node and make replicas of them. The replicas nodes are duplicate nodes which are created by an adversary make many replica nodes all having same ID and these replica nodes are controlled by an adversary. Then these fake data are injected into a network which may cause eaves dropping in network communication. The fake data disrupt the network operations in network communication. Several replica node detection schemes have been proposed to defend against in static sensor network and they do not work well in mobile sensor networks where sensors are expected to move. The simplest defensive measure against the clone attacks is to prevent an adversary from extracting secret key materials from captured nodes by virtue of tamper-resistant hardware. However, the hardware-based defensive measures are too expensive to be practical for resource-restricted sensor nodes. Various kinds of software-based clone detection schemes have recently been proposed for WSNs, considering many different types of network configuration, such as device types and deployment strategies. The limitation of software based clone detection schemes is undoubtedly that they are not generic, meaning that their performance and effectiveness may depend upon their preconfigured network settings. For example, a clone detection scheme designed for mobile WSNs is useless in static WSNs. In order to choose an effective detection scheme for a certain sensor network, it is desirable to have a set of well-designed selection criteria.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 99 – 102 _______________________________________________________________________________________________ 101 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies and detection ranges, and then classify the existing schemes according to the proposed criteria. First, divide static and mobile sensors according to their mobility. A static sensor node cannot move, while the location of a mobile sensor changes depending on operational scenarios. Clone detection strategies can be classified in this sense as well. Second, classify the detection schemes to centralized and distributed schemes[4], i.e., in terms of the ways to collect and verify evidence of clones. One is that a central node, such as a base station (BS), acts solely on detecting clones, and the other is that a group of sensor nodes conduct the clone detection cooperatively. Third, according to the ways how to deploy sensor nodes divide them into random uniform deployment and grid deployment strategies. The former is that sensor nodes are scattered in a region randomly, and the latter works in a way that they are placed in prescheduled zones by dividing a given deployment field into a number of practical location zones. Finally, according to clone detection locations, divide the schemes into whole area and local area detection schemes. In the former schemes, all sensor nodes work jointly in detecting clones, but in the latter schemes only a subset of them will conduct it locally. To summarize, classify the existing clone detection schemes based on the following criteria: 1) Device type: static (sensor) versus mobile (sensor); 2) Detection method: centralized (detection) versus distributed (detection); 3) Deployment strategy: random uniform (deployment) versus grid (deployment); 4) Detection range: whole (area detection) versus local (area detection). II SYSTEM ANALYSIS EXISTING SYSTEM The Existed schemes rely only on fixed sensor locations in static sensor networks. A particularly dangerous attack is the replica node attack, in which the adversary takes the secret keying materials from a compromised node. The adversary can generates a large number of attacker- controlled replicas that share the compromised node’s keying materials and ID, and then spreads these replicas throughout the network. For detecting replica node attacks is due to randomized and line selected multicast schemes to detect replicas in static wireless sensor networks.  DEMERITS  The locally generated outgoing messages in a network normally cannot provide the aggregate large-scale spam view required by these approaches.  Outgoing messages gives rise to the sequential detection problem.  Blocking policy is not adopted. PROPOSED SYSTEM It proposes a fast and effective replica node detection schema using the sequential probability ratio test. The sensor node is compare it to a predefine threshold, if it is more than threshold value, we decide the sensor node has a captured nodes. This simple approach achievers efficient node captures detection capability as long as a threshold value is properly configured. However, it is not easy to configure a proper a threshold value to detect captured nodes. If set threshold to a high value it is likely that captured nodes bypass the detection. On the contrary if we set threshold to a low value, it is likely that benign nodes can be detected as a captured nodes. It uses scheme for distributed detection of mobile malicious node attacks in mobile sensor networks. The key idea of this scheme is to apply sequential hypothesis testing[5] to discover nodes that are silent for unusually many time periods such nodes are likely to be moving and block them from communicating. To design an effective, fast, and robust replica detection scheme specifically for mobile sensor networks. For the effective scheme a novel mobile replica detection scheme based on the Sequential Probability Ratio Test (SPRT)[6]. By using the fact that an uncompromised mobile node should never move at speeds in excess of the system- configured maximum speed. Also through quarantine analysis that the amount of time, during a given time slot, that the replicas can impact the network is very limited.  MERITS  To minimize these false positives and false negatives apply the SPRT.  That can make decisions quickly and accurately.  It is an effective, fast, and robust replica detection scheme specifically for mobile sensor networks. III MODULE DESCRIPTION  Duplicate Node Detection  Centralized Detection  Local Detection  Node-To-Network Broadcasting  Probabilistic Failure Detection  Detecting Replicas 3.1 Duplicate Node Detection The nodes which are captured by an adversary can compromise the sensor nodes and make many replicas of
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 99 – 102 _______________________________________________________________________________________________ 102 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ them. These compromised nodes all have the same ID are present in the network. To understand the dangers of node compromise must first define what we mean by node compromise. Node compromise occurs when an attacker, though some subvert means, gains control of a node in the network after deployment. Once in control of that node, the attacker can alter the node to listen to information in the network, input malicious data[7], cause DOS, black hole, or any one of a myriad of attacks on the network. The attacker may also simply extract information vital to the network’s security such as routing protocols, data, and security keys. Generally compromise occurs once an attacker has found a node, and then directly connects the node to their computer via a wired connection of some sort. Once connected the attacker controls the node by extracting the data and/or putting new data or controls on that node. 3.2 Centralized Detection The most straightforward detection scheme requires each node to send a list of its neighbors and their claimed locations to the base station. The base station can then examine every neighbor list to look for replicated nodes. If it discovers one or more replicas, it can revoke the replicated nodes by flooding the network with an authenticated revocation message. 3.3 Local Detection To avoid relying on a central base station could instead rely on a node’s neighbors to perform replication detection. Using a voting mechanism, the neighbors can reach a consensus on the legitimacy of a given node. Unfortunately, while achieving detection in a distributed fashion, this method fails to detect distributed node replication in disjoint neighbourhoods within the network. As long as the replicated nodes are at least two hops away from each other, a purely local approach cannot succeed. 3.4 Node-To-Network Broadcasting One approach to distributed detection utilizes a simple broadcast protocol. Essentially, each node in the network uses an authenticated broadcast message to flood the network with its location information. Each node stores the location information for its neighbors and if it receives a conflicting claim, revokes the offending node. 3.5 Probabilistic Failure Detection In this section describe in detail the Protector probabilistic replica maintenance approach, and analyze its effectiveness. It begins by first describing the high level replica maintenance problem as context. Then describe the Protector approach in detail, and prove that its estimate on the number of remaining replicas is the most accurate. Finally describe in detail how to derive Protector’s failure probability function[8] through both a Markov failure model and extraction from measurement traces of failure events. 3.6 Detecting Replicas Unlike the Random Multicast and Line-Selected Multicast algorithms,[9] where the nodes storing the copies of a location claim are chosen randomly from the whole network, in Software Defined Concern (SDC) such nodes are chosen randomly from a small subset of all the nodes in the network, i.e., the nodes in the destination cell determined by the geographic hash function. In addition, since the location claim will be flooded within the destination cell, the SDC scheme can always detect any pair of nodes claiming the same identity. In other words, pdr = 100% in SDC, when r > 0 and w > 0. IV CONCLUTION The concludes detection of mobile replica node attacks in mobile sensor networks using speed measurement testing. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. In this work, a fast and effective mobile replica node detection scheme using the Sequential hypothesis testing. V FUTURE ENHANCEMENT Finally some open issues have been identified that are left as future. This proposed system at the time several nodes are detected. But in this future work to increase the detection level. REFERENCES [1] Ambiritha M.A, Gomathi V “Efficient Node Replica Detection In Wireless Sensor Networks”2008. [2] ChakibBekara and Maryline Laurent-Maknavicius“Defending Against Nodes Replication Attacks on Wireless Sensor Networks”2010. [3] Dr.Chellappan..CandManjula.V,”Replication Attack Mitigations for Static and Mobile Wireless sensor networks”1999. [4] jun-won ho, “Distributed Detection Of Replicas With Deployment Knowledge In Wireless Sensor Networks”2007. [5] Jun-Won Ho,“Sequential Hypothesis Testing Based Approach for Replica Cluster Detection in Wireless Sensor Networks”2010. [6] Jun-Won Ho, Matthew Wright “Fast Detection of Mobile Replica Node Attacks in Sensor Networks Using Sequential Hypothesis Testing” IEEE 2011. [7] Pavithraa.S,Balakrishnan.C “Fake Data Termination in Wireless Sensor Networks” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-2, June 2012. [8] Liang-Min Wang, and Yang Shi “Patrol Detection for Replica Attacks on Wireless Sensor Networks”2011. [9] Conti et al. In their work “A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks “ (2007).