Advanced Extremely Efficient Detection of Replica Nodes in Mobile Wireless Sensor Networks

Mehdi Safari - Islamic Azad University, Sanandaj, Iran
Elham Bahmani - Islamic Azad University, Malayer, Iran
Mojtaba Jamshidi - Islamic Azad University, Qazvin, Iran
Abdusalam Shaltooki - University of Human Development, Sulaymaniyah, Iraq


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.3.4.254

Abstract


Today, wireless sensor networks (WSNs) are widely used in many applications including the environment, military, and explorations. One of the most dangerous attacks against these networks is node replication. In this attack, the adversary captures a legal node of the network, generates several copies of the node (called, replica nodes) and injects them in the network. Various algorithms have been proposed to handle replica nodes in stationary and mobile WSNs. One of the most well-known algorithms to handle this attack in mobile WSNs is eXtremely Efficient Detection (XED). The main idea of XED is to generate and exchange random numbers among neighboring nodes. The XED has some drawbacks including high communication and memory overheads and low speed in the detection of replica nodes. In this paper, an algorithm is presented to improve XED. The proposed algorithm is called Advanced XED (AXED) in which each node observes a few numbers of nodes and whenever two nodes meet, a new random number is generated and exchanged. The efficiency of the proposed algorithm is evaluated in terms of the memory and communication overheads and its results are compared with existing algorithms. The comparison results show that the proposed algorithm imposes lower overheads to the nodes. In addition, the proposed algorithm is simulated and the simulation results show that the proposed algorithm is able to detect replica nodes faster than XED.


Keywords


wireless sensor network; mobile nodes; security; replication attack, XED algorithm.

Full Text:

PDF

References


M. Jamshidi, H. Bazargan, A. A. Shaltooki, A. M. Darwesh, A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks. JOIV: International Journal on Informatics Visualization 3(1) (2019) 41-46.

M. Jamshidi, E. Zangeneh, M. Esnaashari, and M. R. Meybodi, “A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networksâ€, Computers & Electrical Engineering, 64, 2017, pp. 220-232.

M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and M. R. Meybodi. 2019. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. Wireless Personal Communications, 105 (1) 145-173.

M. Jamshidi, M. Ranjbari, M. Esnaashari, N. N. Qader, M. R. Meybodi, “Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes,†JOIV: International Journal on Informatics Visualization, 2(3): 159-165, 2018.

B. Parno, A. Perrig, V. D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,†IEEE Symposium on Security and Privacy: 49-63, 2005.

M. Jamshidi, A. A. Shaltooki, Z. D. Zadeh and A. M. Darwesh, “A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks,†JOIV: International Journal on Informatics Visualization. 3(1): 13-17, 2019.

M. Conti, R. D. Pietro, L. V. Mancini, A. Mei, “Distributed Detection of Clone Attacks in Wireless Sensor Networks,†IEEE transactions on dependable and secure computing, 8(5): 685-698, 2011.

C. Ding, L. Yang, M. Wu, “Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge,†Sensors, 17(1), 160-152, 2017.

S. Roy, M. J. Nene, “Prevention of node replication in Wireless Sensor Network using Received Signal Strength Indicator, Link Quality Indicator and Packet Sequence Number,†IEEE International Conference on Green Engineering and Technologies (IC-GET), 1-8, 2016.

C. M. Yu, C. S. Lu, S. Y. Kuo, “Mobile Sensor Network Resilient Against Node Replication Attacks,†IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 597-599, 2008.

J. W. Ho, M. Wright, S. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing,†IEEE transactions on mobile computing, 10(6): 767-782, 2011.

C. Zhou, Z. Wang, “An Two Dimension detection to node replication attacks in mobile sensor networks,†10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), 63-69, 2016.

T. Dimitriou, E. A. Alrashed, M. H. Karaata and A. Hamdan, “Imposter detection for replication attacks in mobile sensor networks,†Computer Networks, vol. 108, pp. 210-222, Oct. 2016.

M. Conti, R. D. Pietro, A. Spognardi, “Clone wars: Distributed detection of clone attacks in mobile WSNs,†Journal of Computer and System Sciences, 80(3): 654-669, 2014.

Jamshidi, M., Poor, S.S.A., Qader, N.N., Esnaashari, M. and Meybodi, M.R., 2019. A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents. IEIE Transactions on Smart Processing & Computing, 8(1), pp.58-70.

M. Jamshidi, A. M. Darwesh, A. Lorenc, M. Ranjbari, M. R. Meybodi, “A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks,†IEIE Transactions on Smart Processing & Computing, 7(6): 457-466, 2018.

M. Jamshidi, M. Ranjbari, M. Esnaashari, N. N. Qader and M. R. Meybodi. 2018. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes. JOIV: International Journal on Informatics Visualization, 2(3): 159-165.