DocumentCode
186
Title
On the Node Clone Detection in Wireless Sensor Networks
Author
Zhijun Li ; Guang Gong
Author_Institution
CORBU branch, Cisco Syst. Canada Co., Ottawa, ON, Canada
Volume
21
Issue
6
fYear
2013
fDate
Dec. 2013
Firstpage
1799
Lastpage
1811
Abstract
Wireless sensor networks are vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations. Although the DHT-based protocol incurs similar communication cost as previous approaches, it may be considered a little high for some scenarios. To address this concern, our second distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.
Keywords
probability; protocols; wireless sensor networks; DHT-based protocol; checking system; communication overhead; distributed hash table; high security level; key-based caching; node clone detection protocol; probabilistic directed forwarding technique; probability model; randomly directed exploration; satisfactory detection probability; second distributed detection protocol; storage consumption; wireless sensor networks; Cloning; Mathematical model; Measurement; Protocols; Security; Wireless sensor networks; Distributed detection; distributed hash table; node clone attack; randomly directed exploration; wireless sensor networks (WSNs);
fLanguage
English
Journal_Title
Networking, IEEE/ACM Transactions on
Publisher
ieee
ISSN
1063-6692
Type
jour
DOI
10.1109/TNET.2012.2233750
Filename
6403599
Link To Document