REPLICATION ATTACK DETECTION IN WIRELESS SENSOR NETWORKS BY EFFICIENT NODE DEPLOYMENT

##plugins.themes.bootstrap3.article.main##

Charumathim A.C Velumani M

Abstract

Wireless sensor network is an emerging area in which multiple sensor nodes are deployed to perform monitoring tasks. Sensor nodes are deployed in an open environment or infrastructure which can be easily affected by number of mischievous attacks. Security is the important consideration in wireless sensor environment. Node replication attack is one of the dangerous types of attack in which attacker may generate the replica or clone of existing node in the same network by extracting all the credentials. In the node replication attacks the adversary captures the sensor node and extract the secret credentials. After extracting the secrets, duplicate the node and deploys in the duplicated node in the network. The duplicate node is called as clone nodes or replicated nodes. In Existing project LEACH (NI-LEACH) protocol to reduce the scale of the cluster by considering the residual energy of nodes and the optimal number of clusters. 
But need more security in this protocol. There may be case when the attacker replicates the whole cluster and attack the multiple nodes in one go. So, we use the Dynamic Secure Intrusion Detection Protocol model (DSIDP) detection method for defending against node replication attack. It is the intrusion detection process which is based on the monitoring nodes. The clustered network is taken into consideration in which clustering is done by underwater density based clustering sensor network (UWDBCSN) algorithm. The detection approach is integrated with sleep/wake scheduling algorithm to enhance the network performance.

##plugins.themes.bootstrap3.article.details##

Section
Articles