Skip to main content

Advertisement

Log in

Node coloring based replica detection technique in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Node replication attack possess a higher level of threat in wireless sensor networks. A replicated node takes advantage of having legal identity of the compromised node to control the network traffic and inject malicious information into the network. Several techniques have been proposed to detect node replication in wireless sensor networks. However, in most of these techniques, the responsibility for replica detection lies either with the base station or a few randomly selected witness nodes. In this paper, we propose a technique for detecting replicas without the participation of base station and witness nodes. In the proposed scheme, each node is assigned with a color (value), which is unique within its neighborhood. A color conflict within the neighborhood of a node is detected as a replica. We made a comparison of the proposed scheme with RED (Conti et al. in IEEE Trans Dependable Secure Comput 8(5):685–698, 2011), LSM (Parno et al. in Proceedings of IEEE symposium on security and privacy. IEEE, pp 49–63, 2005), and SET (Choi et al. in Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007. IEEE, pp 341–350, 2007). Parameters considered for comparison are detection probability, communication complexity and storage overhead. We observed that the proposed scheme has a higher detection probability, and lower communication and storage overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Boulis, A. (2011). Castalia 3.2, user’s manual. Australia: National ICT Australia Ltd.

  2. Choi, H., Zhu, S., & Porta, T. F. L. (2007). SET: Detecting node clones in sensor networks. In: Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007 (pp. 341–350). IEEE.

  3. Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685–698.

    Article  Google Scholar 

  4. Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488.

    Article  Google Scholar 

  5. Karl, H., & Wilig, A. (2005). Protocols and architectures for wireless sensor netowks.  Hoboken: Wiley.

    Book  Google Scholar 

  6. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2 and 3), 293–315.

    Article  Google Scholar 

  7. Macula, A. J. (1996). A simple construction of d-disjunct matrices with certain constant weights. Discrete Mathematics, 162(1), 311–312.

    Article  MathSciNet  MATH  Google Scholar 

  8. Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE symposium on security and privacy (pp. 49–63). IEEE.

  9. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.

    Article  Google Scholar 

  10. Sei, Y., & Honiden, S. (2009). Reporter node determination of replicated node detection in wireless sensor networks. In Proceedings of the 3rd international conference on ubiquitous information management and communication, ICUIMC’09 (pp. 566–573). ACM.

  11. Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks technology, protocols, and applications.  Hoboken: Wiley

    Google Scholar 

  12. Tran, T. D., & Agbinya, J. I. (2010). Early and lightweight distributed detection of node replication attack in sensor networks. In Proceedings of IEEE wireless communications and networking conference (WCNC) (pp. 01–06). IEEE.

  13. Varga, A., & Hornig, R. (2008). An overview of the Omnet++ simulation environment. In Proceedings of 1st international conference on simulation tools and techniques for communications, networks and systems and workshops, SimuTools’08 (pp. 01–10).

  14. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), 02–23.

    Article  Google Scholar 

  15. Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In Proceedings of the 28th international conference on distributed computing systems, ICDCS’08 (pp. 17–20). IEEE.

  16. Zhu, B., Setia, S., Jajodia, S., Roy, S., & Wang, L. (2010). Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Transactions Mobile Computing, 9(7), 913–926.

    Article  Google Scholar 

  17. Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor and mobile radio communications, 09 (pp. 82–86). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Kumar Turuk.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, A.K., Turuk, A.K. Node coloring based replica detection technique in wireless sensor networks. Wireless Netw 20, 2419–2435 (2014). https://doi.org/10.1007/s11276-014-0751-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0751-9

Keywords

Navigation