A Random Walk method on Replicate Node Attack detection SRW in Wireless Sensor Network | IJCSE Volume 10 – Issue 1 | IJCSE-V10I1P15

IJCSE International Journal of Computer Science Engineering Logo

International Journal of Computer Science Engineering Techniques

ISSN: 2455-135X
Volume 10, Issue 1  |  Published:
Author

Abstract

In wireless sensor networks, clone detection protocols demonstrate that RAWL yields the most favourable outcomes by utilizing Simple Random Walk (SRW). In order to simplify the process of selecting trustworthy IoT devices for the purpose of verifying location evidence, a paradigm has been developed for recognizing such devices based on their profile capabilities. We evaluated our system with LSM, RED, and P-MPC, noting that it exhibits a superior clone identification probability and reduced communication costs. Formulating an effective defence to address this problem is crucial. Numerous witnesses’ node-based techniques are being established in order to address this issue; nevertheless, they frequently have higher connection and storage costs or lower detection accuracy, which renders them ineffectual. In Wireless Sensor Networks (WSNs), the HRWZ approach employs the random selection of Zone-Leader (ZL) in order to discover clones in an efficient manner while maintaining the resilience of the network. Comparing HRWZ against other well-known witness node-based approaches such as RM, LSM, and RAWL was one of our analyses, and TRAWL, and we did so over a range of simulation parameters.

Keywords

SRW, ZL, LSM, Random Walk Detection

Conclusion

The purpose of this study is to offer a zone-based node replica detection technique for wireless sensor networks (WSN). As part of the proposed plan, the network will be divided into numerous distinct zones. There is a zone leader in charge of each zone, and their responsibility is to detect clones that are present inside the network. (i) Zone Registration and (ii) Replica Detection were the two processes that ZBNRD went through in order to function. After comparing our proposed method to other options that are already available, we came to the conclusion that it possesses a higher detection probability and a lower communication overhead. The techniques for detecting clones, such as RAND and RAWL, make use of SRW, which naturally revisits previously traversed nodes. Consequently, there is less chance of witness node intersection and detection. In this study, a distributed technique called Single Stage Memory Random Walk with Network Division (SSRWND) is presented to overcome the issue of node revisiting. By incorporating restricted memory random walk with network division, this technique enhances the RAND protocol. Through the utilization of a memory-enhanced random walk that keeps track of the most recently visited node within a record, SSRWND outperforms RAND, RAWL, and TRAWL. This results in a reduction in the number of node revisits.

References

1.Khan, W.Z.,Aalsalem,M.Y.,Saad,N.M.,Xaing,Y.,&Luan,T.H.(2014,April). Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. In Wireless Communications and Networking Conference (WCNC),2014IEEE (pp.2623–2628).IEEE. 2.SeoW.J., IslamR.,KhanM.K.,&ChooK.K.R.(2015).ASecureCross-DomainSIPSolutionfor Mobile AdHoc Network Using Dynamic Clustering. In Security and Privacy in Communication Networks (pp. 649–664). Springer International Publishing. 3.ContiM., DiPietroR.,& Spognardi A.(2014). Clone wars: Distributed detection of clone attacks in mobile WSNs. Journal of Computer and System Sciences, 80(3),654–669. 4.KhanW.Z., HossainM.S.,AalsalemM.Y.,SaadN.M.,&AtiquzzamanM.(2016).Acostanalysis framework for claimer reporter witness based clone detection schemes in WSNs. Journal of Network and Computer Applications, 63, 68–85. 5.Devi and Jaison, 2020 Devi P., Jaison B. Google Scholar Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms Comput. Commun., 152 (2020), pp. 316-322 6.Shanmugam and Paramasivam, 2020 Shaukat et al., 2014 Shaukat et al., 2020 Sun et al., 2017 Wang et al., 2008 Wollschlaeger et al., 2017 Xing and Cheng, 2010 Xing et al., 2008 Yang et al., 2017 Yu et al., 2013 Shanmugam A., Paramasivam J. A two-level authentication scheme for clone node detection in smart cities using Internet of things Comput. Intell., 36 (3) (2020), pp. 1200-1220 7.KhanW.Z.,AalsalemM.Y.,&SaadN.M.(2015).DistributedCloneDetectionin StaticWirelessSen sor Networks: RandomWalkwithNetworkDivision.PloS one, 10(5), e0123069. doi: 10.1371/journal. pone.0123069 PMID:25992913 8.Yu et al., 2013, Yu C.-M., Tsou Y.-T., Lu C.-S., Kuo S.-Y. Localized algorithms for detection of node replication attacks in mobile sensor networks IEEE Trans. Inf. Forensics Secur., 8 (5) (2013), pp. 754-768 9.Shaukat et al., 2014 Shaukat H.R., Hashim F., Sali A., Abdul Rasid M.F. Node replication attacks in mobile wireless sensor network: a survey Int. J. Distrib. Sens. Netw., 10 (12) (2014), Article 402541 10.Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488. 11.Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and counter measures. Ad Hoc Networks, 1(2 and 3), 293–315. 12.Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. In Proceedings of the 4th annual international conference on wireless internet, WICON ’08 (pp. 01–08). Brussels, Belgium: ICST. 13.Choi, H., Zhu, S., & Porta, T. F. L. (2007). Set: Detecting node clones in sensor networks. In Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007, IEEE, Nice, France, pp. 341–350. 14.Zhang, M., Khanapure, V., Chen, S., & Xiao, X. (2009). Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of 17th IEEE international conference on network protocols, ICNP’09 (pp. 284–293). Princeton, NJ: IEEE. Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor and mobile radio communications, 09 (pp. 82–86). Tokyo: IEEE.
Š 2025 International Journal of Computer Science Engineering Techniques (IJCSE).
Submit Your Paper