ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks

P.Hima Bindu1, T. Venkata Naga Jayudu2
  1. Intell Engineering College (Affliated to JNTU-Ananthapuramu & Approved by AICTE and Accrediated by NBA),Ananthapuramu, Andra Pradesh, India
  2. Intell Engineering College (Affliated to JNTU-Ananthapuramu & Approved by AICTE and Accrediated by NBA),Ananthapuramu, Andra Pradesh, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Wireless sensor networks are resource constrained and vulnerable to various kinds of attacks. In this paper we study node clone attack. Many solutions came into existence and for detecting this attack. Many solutions need assumptions to have the problem solved in large-scale deployment of sensors. They have tradeoffs between the solutions provided and network conditions. Recently Li and Gong proposed two protocols for node clone detection with different tradeoffs with network conditions. Distributed Hash Table (DHT) was used to have distributed mechanisms for node clone detection. Due to the overhead caused by DHT, they proposed another protocol that overcomes this problem. In this paper, we implement a novel mechanism that can detect node clone attack in wireless sensor networks. We made simulations in NS2 to demonstrate the proof of concept.

Keywords

Wireless sensor networks, node clone detection, distributed hash code

INTRODUCTION

Wireless sensor networks became very useful networks in the real world as they are easy to deploy and useful for monitoring various environments in both civilian and military contexts. Due to the popularity of WSN, there are increased security threats. The general structure of WSN and its sensor and base station nodes is as presented in Figure 1.
As can be shown in Figure 1, wireless sensor network is a collection of sensor nodes which can sense data about targets. The sensor nodes sense the unknown object data and send to sink node. The sink node can be accessed by authorized users through Internet. In fact the sink node can be queried in order to monitor the area under coverage of WSN.
Node cloning is one of the attacks in WSN that will cause the network to lose sensitive information to adversaries. There were many node clone detection mechanism found in the literature. The solutions are classified into prevention mechanism, centralized mechanism and distributed mechanisms. More details can be found in section II. In this paper, we built a framework and proposed an algorithm in order to detect node clone attack sin WSN. The remainder of the paper is structured as follows. Section II provides review of literature on prior works. Section III presents the proposed solution. Section IV provides details of experiments while section V concludes the paper besides making directions for future work.

RELATED WORKS

The literature on node clone detection is reviewed and presented in this section. The prior works in node clone detection in WSN reveal prevention mechanisms, centralized detection and distribution detection models. With respect to distributed detection model [1] it is evident that every node in WSN has the capabilities to detect node clones. Two probabilistic protocols were explored in [1] to achieve this. However, it has many assumptions that will limit the practical use of the detection mechanism in the real world. Other clone detection mechanisms were explored in [7] and [6] where nodes have the knowledge of the geography where the nodes have been deployed. Various protocols have different requirements including neighbors’ information, awareness of all nodes, knowledge of network geography, DHT nodes information.
With respect to centralized detection the detection process is with the base station. The sensor nodes will not have the capabilities of node clone detection. It also causes communication cost. The SET protocol explored in [8] is able to reduce communication cost by using the notion of constructing exclusive subsets. In [9] another solution is proposed using the notion of pre-key distribution as explored in [10] technically it is the process of detecting the compromised keys instead of detecting clone nodes. As per this protocol, each and every node exports its keys to base station. A problem with this kind of approach is the high rate of false positive and false negative reports.
With respect to prevention mechanisms, location based keys are explored in [3] for node clone detection process. Identity based cryptography is used in order to achieve this. The location based keys are issues by trusted agents by travelling the WSN. Similar kinds of solutions are made in [5] and [4]. These are useful in specific WSN applications in the real world. However, the assumptions they have will have limits in real time applications.

PROPOSED SOLUTION

In this paper we proposed a solution that can detect node clone attacks in WSN. We built a general framework that has underlying algorithm in order to ensure that the node clone attacks launched by adversaries are detected positively. The general framework is as shown in Figure 2. Then we proposed an algorithm named Randomly Directed Exploration Protocol for Clone Detection for node clone detection.
As can be seen in Figure 2, there is outline of the node clone detection process. First of all the message handling phase is called out. When the message arrives at its destination, the underlying algorithm is supposed behave based on the return messages. The algorithm returns NIL when message arrives at the destination otherwise it returns the ID of the node and the algorithm continues. The other phases in the proposed solution include inspection and detection. The inspection phase is used to determine whether there is possible detection and the actual detection phase confirms the clone presence in the WSN. The proposed algorithm is as shown in listing 1.
image
As can be seen in listing 1 there is evidence of detecting clones in the verification phase followed by detection process. The node clone detection procedure initially return NIL or ID based on the arrived message. When there is key verification and suspects duplicate, then verification phase is carried out in order to check in cache and update the cache accordingly and broadcast the evidence of the node clone if found positively.

Load Balancing and Traffic Distribution

Apart from node clone detection, we implemented load balancing and traffic distribution mechanisms that work towards reducing congestion and improving throughput. Mobile nodes act as transmitter and receiver of data and they are utilized in such a way that information can be updated even when the nodes are out of range. This is achieved via cooperatitve transmission of data. Nodes are also able to compute distance range from node to node thus nodes can sense and update information. Load balancing has other advantages such as energy efficiency besides improving throughput and reducing congestion. The experimental results are shown in the following section.

EXPERIMENTAL RESULTS

Experiments are made through NS2 simulations. The simulations demonstrate the wireless sensor network with base station and sensor nodes. Besides it shows how the node clone attack is made and detected by the proposed solution. Malicious nodes are detected and secure communications are in place using asymmetric cryptography. The experiments are made in terms of number of nodes and average number of messages sent per node; number of nodes and detection probability; packet delivery ratio and time; number of nodes and transactions per second. The performance of the proposed system is compared with the existing system.
As can be seen in Figure 3, it is evident that the proposed system outperforms existing system in terms of average number of messages sent per node.
As can be seen in Figure 4, it is shown that the number of nodes have influence on the detection probability. The proposed system exhibits higher detection probability.
As can be seen in Figure 5, the packet delivery ratio is compared between the existing and proposed systems. The proposed solution has increased the packet delivery ratio.
As can be seen in Figure 6, it is evident that the throughput of the proposed system is better than that of existing system.

CONCLUSIONS AND FUTURE WORK

In this paper we studied the node clone detection attacks and counter measures in WSN. Node clone attack is one of the attacks in WSN that exploit vulnerabilities in order to obtain sensitive information from the network. An adversary can launch such attack and makes a clone node for a genuine sensor node. Since the clone node is under the influence of the adversary, it follows the instructions of the attacker. Thus it collected sensitive information flows that can benefit adversary in one way or other. We proposed an algorithm that has mechanisms to detect clone attacks in WSN. The algorithm acts as inspector that will monitor messages and in order to determine node clone attacks. We built a simulation model which demonstrates the proof of concept. The NS2 simulations reveal that the proposed solution is useful to detect clone attacks in WSN. In future we would like to implement the algorithm in real world environment.
 

Figures at a glance

Figure 1 Figure 2 Figure 3
Figure 1 Figure 2 Figure 3
Figure 4 Figure 5 Figure 6
Figure 4 Figure 5 Figure 6
 

References