Abstract
Wireless sensor network are prone to different types of attacks due to lack of supervision. Trusting the data received from the network becomes quite difficult. Implementing prevention and detection techniques provide strong impediment to the network from getting compromised. In this paper both the techniques are being utilized providing better reliance over the data being communicated. Pair-wise keys and group wise keys are being generated, which also provides identity of the nodes at that instant of time. This technique deters wormhole attack to a large extent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mainwaring, A., Culler, D., Polastre, J., Polastre, J., Polastre, J.: Wireless Sensor Networks For Habitat Monitoring. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, doi:10.1145/570738.570751
Szewczyk, R., Osterweil, E., Polastre, J., Hamilton, M., Hamilton, M., Hamilton, M.: Habitat monitoring with sensor networks. Magazine of Communications of the ACM - Wireless Sensor Networks 47(6) (2004)
Naumowicz, T., Freeman, R., Kirk, H., Dean, B., Calsyn, M., Liers, A., Braendle, A., Guilford, T., Schiller, J.: Wireless Sensor Network for habitat monitoring on Skomer Island. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 882–889 (2010), doi:10.1109/LCN.2010.5735827
Hefeeda, M., Bagheri, M.: Wireless Sensor Networks for Early Detection of Forest Fires. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, pp. 1–6. Simon Fraser Univ., Surrey (2007), doi:10.1109/MOBHOC.2007.4428702
Mal-Sarkar, S., Sikder, I.U., Konangi, V.K.: Application of wireless sensor networks in forest fire detection under uncertainty. In: 13th International Conference on Computer and Information Technology (ICCIT), pp. 193–197 (2010), 10.1109/ICCITECHN.2010.5723853
Lee, S.H., Lee, S., Song, H., Lee, H.S.: Wireless sensor network design for tactical military applications: Remote largescale environments. In: Military Communications Conference, pp. 1–7. IEEE (2009), doi:10.1109/MILCOM.2009.5379900
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Commnication 24(2), 370–380 (2005)
Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010), doi:10.1109/ICIE.2010.66
Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. Journal EURASIP Journal on Wireless Communications and Networking - Special Issue on Wireless Network Algorithms, Systems, and Applications 2010, doi:10.1155/2010/627039
Modirkhazeni, A., Aghamahmoodi, S., Modirkhazeni, A., Niknejad, N.: In: The 7th International Conference on Networked Computing (INC), pp. 122–128 (2011)
Sharmila, S., Umamaheswari, G.: Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1–6 (2011), doi:10.1109/PACC.2011.5978973
Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 526–531 (2008), doi:10.1109/WiMob.2008.83
Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Journal Computer Communications 30(11-12) (2007), doi:10.1016/j.comcom.2007.04.025
Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. The International Journal of Computer and Telecommunications Networking 53(18) (2009), doi:10.1016/j.comnet.2009.07.013
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses (January 2004)
Xiu-Li, R., Wei, Y.: Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4 (2009), doi:10.1109/WICOM.2009.5302573
Su, C.-C., Chang, K.-M., Kuo, Y.-H., Horng, M.-F.: The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE Conference on Wireless Communication and Networking, vol. 4, pp. 1927–1932 (2005), doi:10.1109/WCNC.2005.1424814
Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 8(1) (2005), doi:10.1145/1053283.1053287
Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004), doi:10.1145/1029102.1029111
Camtepe, S.A., Yener, B., Yung, M.: Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks. In: IEEE International Conference on Communication, pp. 2262–2267 (2006), doi:10.1109/ICC.2006.255107
Sajedi, H., Jamzad, M.: Secure cover selection steganography. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 317–326. Springer, Heidelberg (2009)
Turner, C.: A steganographic computational paradigm for wireless sensor networks. In: International Conference on Innovations and Information Technology, pp. 258–262 (2009), doi:10.1109/IIT.2009.5413637
Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)
Chen, C., Song, M., Hsieh, G.: Intrusion detection of Sinkhole attack in largescale wireless sensor network. In: WCNIS 2010, pp. 711–716 (2010)
Labraoui, N., Gueroui, M., Aliouat, M.: Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. In: European Transactions on Telecommunications, doi:10.1002/ett.1532
Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: WiMob 2008, pp. 526–531 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ambika, N., Raju, G.T. (2013). DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_75
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)