Published February 1, 2020 | Version v1
Journal article Open

Node clone detection using a stable overlay network

  • 1. SRM Institute of Science and Technology

Description

Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data"s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.

Files

31 29Aug 16Aug 20Apr 19621 (edit lia).pdf

Files (453.1 kB)

Name Size Download all
md5:d639a16d6b2f93eee9e7c5c4d2ec1cef
453.1 kB Preview Download