SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 92-96
www.iosrjournals.org
DOI: 10.9790/0661-17129296 www.iosrjournals.org 92 | Page
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Sandip D. Girase1
, Ashish T. Bhole2
1,2
Department of Computer Engineering,
SSBT’s College Of Engineering & Technology, Jalgaon, Maharashtra, India
Abstract: Network security has become a challenging area, historically only tackled by well qualified and
familiar experts. Although more pupils are becoming wired, an increasing number of pupils need to understand
basics of security in the network world. The paper is written from the prospective of the basic computer user
and information systems administrator, illuminating the concepts needed to go through the hype in the
marketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allow
the attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work on
replica node recognition relies on set sensor locations and hence do not work in mobile sensor network. The
paper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to the
sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can
result in a fast and effective detection of mobile replica nodes within wireless sensor network.
Keywords: Wireless sensor network (WSN), network security, attack detection, node replication, tamper
resistant hardware, sequential probability ratio test (SPRT)
I. Introduction
Now a day’s robotics have the advances which is responsible for developing several [1] architecture for
autonomous wireless sensor networks. This unattended nature of wireless sensor networks can be exploited by
adversaries. The adversaries takes the secret keying materials from a compromised node, generates a huge
amount of attacker-controlled replicas that share the node’s keying resources and ID, and then spreads these
replicas right through the network. With a particular captured node, the adversary can form as many replica
nodes as he has the hardware to generate [8]. One of the solutions for this is the use of tamper-resistance
hardware to prevent adversary from extracting the keying material.
1.1 Tamper–resistant hardware
For protecting the keys the appropriate way is to store them in a tamper-resistant hardware tool. Such
devices can be used for applications ranging from safe e-mail to electronic cash and credit cards. They suggest
substantial shield to the keys residing within them, thus providing a few guarantee that these keys have not been
maliciously read or modified. Typically in advance access to the contents of a tamper-resistant device requires
knowledge of a PIN or password exactly what type of access can be gained with this knowledge is device
dependent.
1.2 Sequential hypothesis test
The sequential hypothesis testing is statistical analysis where the sample size is not set in progress. as a
replacement for data are evaluate as they are collected, and additional sampling is stopped in accordance with a
pre-defined stopping rule as soon as significant results are observed. as a result a climax may sometimes be
reached at a much earlier stage than would be possible with more classical hypothesis testing or estimation, at
consequently lower financial and or individual cost.
1.3 Sequential probability ratio test
The sequential probability ratio test (SPRT) is a specific [4] sequential hypothesis test which is
developed for use in quality control studies in the realm of mechanized, SPRT have been formulate used for use
in the computerized testing of human examinees as a termination criterion .It is nothing but a statistical
hypothesis test which is a method of making decision by means of data, whether commencing a forbidden
experimentation or an observational lessons. In information, a result is called statistically significant if it is
unlikely to have occurred by probability alone, according to a fixed threshold probability, the significance level.
These tests are used in determining what outcomes of an experiment would lead to a rejection of the null
hypothesis for a pre-specified level of significance helping to decide whether experimental results contain
enough information to cast doubt on conventional wisdom. It is occasionally called assenting data investigation,
in difference to investigative data analysis. Statistical hypothesis testing is a key technique of frequents
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 93 | Page
statistical inference. The critical region of a hypothesis test is the set of all outcomes which cause the null
hypothesis to be rejected in support of the alternative hypothesis.
1.4 Null hypothesis
The null hypothesis is nothing but a typically corresponds to a general or default position Null
hypothesis is typically paired with a subsequent assumption, the substitute hypothesis, which assert a particular
relationship between the phenomena. The substitute need not be the reasonable negation of the null hypothesis it
predicts the results from the experiment if the substitute assumption is true. The use of substitute hypotheses
was not part of Fisher's formulation, but became standard. It is important to understand that the null hypothesis
can never be expanded beyond the doubt. A set of data can only reject a null hypothesis or fail to reject it. For
instance, if similarity of two groups. Null hypothesis can be work by collecting data and measuring how likely
the particular set of data is, assuming the null hypothesis is true. The null hypothesis (H0) choice and
consideration of directionality is critical.
1.5 Alternative hypothesis
The alternative hypothesis (or maintained hypothesis or research hypothesis and the null hypothesis are
the two rival hypotheses which are compared by a statistical hypothesis test. Sequential probability is a
statistical decision process. It consists of one dimensional random walk with lower and upper limit [5]. A
random walk is a mathematical formalization of a path which consists of a succession of random steps.
II. Related Work
2.1 Attack Resilient Time Synchronization in Wireless Sensor Network
In 2006, H. Song, S. Zhu, and G. Cao the time synchronization in wireless sensor network for attack
resilient. In the sensor network application required time to be synchronized within the network [7]. For instance
the applications include mobile object tracking, data aggregation, TDMA radio arrangement, and message
ordering, to name a few. a sensor network is deployed in an area of interest to monitor passing objects which is
the application of mobile object tracking. The detecting nodes record the detecting location and the detecting
time, object is papering. Later, these location and time information are sent to the aggregation node which
estimates the moving trajectory of the object [6]. Without accurate time synchronization, the estimated
trajectory of the tracked object could differ greatly from the actual one. It also covers the network time
synchronization method relay on message exchange between the nodes. Paper also gives important on the
receiver –receiver model reference broadcast synchronization scheme (RBS) and its prototypes are used.
2.2 A Randomized, Efficient and Distributed Protocol
In 2007, M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, discovered the RED protocol for detection
of replication attack in wireless sensor network. The randomized, efficient and distributed protocol is highly
efficient as compared to other distributed protocol in the sense of communication, memory and computation [2].
In this every claim message of node is signed with its private key ,which allows other nodes to identify any
malicious node not abiding to the protocol .It also allows adversary to know the witness set for any given ID.
But the witness of the node will be any were in the network and it change at every protocol iteration I
unpredicted way .In order to prevent RED from detecting the replicas it is required to be ubiquitous and to
capture all the witness of the cloned nodes within a window period which can be at most share among the
disclosure of rand and next protocol invocation. By considering adversary movement speed and realistic
network size, it admires that few chances for the adversary to perform the same attack. RED performs the
requirement that are area-obliviousness, ID-obliviousness ,low overhead, over head balancing and high replica
attack detection probability .Consider the simulation in that n=1,000 nodes in the network, r=0.1 communication
radius, g=1 and p=0.1 for the red protocol.
2.3 Distributed Detection of Node Attacks with Deployment Knowledge
The idea behind the scheme is to have nodes report location claims, which identify their positions and
attempt to detect conflicting information that single one node in more than one location. For this, every node
should have location claims and verify and store signed location claims of every other node .It gives the idea
behind it that every node should be deploy in groups so that every node should know the information of every
other node .sensors can be pre-located even if sensors can be dropped from airplanes or scattered over an area
by hand (2009).Nodes are deployed in groups allow most nodes to communicate without generating any
location claims as long as they are able to directly send messages to at least one of their group members. This
simple idea allows us to significantly reduce the overhead of sending, receiving, and verifying location claims
[1]. Additionally, if we assume loose time synchronization for the sensors, we can allow nodes to accept
messages from any node that has been deployed within a small window of its expected deployment time.
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 94 | Page
2.4 Real Time Clone Detection
In 2008 K. Xing, F. Liu, X. Cheng, and H.C. Du proposed the scheme clone attack detection in
wireless sensor network. In this scheme a social fingerprint is computed for each sensor by using the
neighborhood characteristics, and checks the legitimacy of the originator for each message by checking the
enclosed fingerprint. Generation of fingerprint is depends on the superimposed s-disjunct code, which incurs a
incredibly illumination communication and computation overhead. The checking of fingerprint is conducted at
both the base station as well as the nearby sensors, which ensures high detection likelihood. It also provides the
real time clone detection in efficient as well as effective way. Unlimited clones were deploying by capturing and
compromise nodes [3]. These nodes can be involve such as that of legitimate node and have access the
legitimate IDs and keys .If these remains inside the network and left undetected then the network get unshielded
to attackers and clone attackers are spread over the entire network. Smart clone may try to hide from being
detected by all means. So far they may collude to cheat the network administrator into believing that they are
legitimate. Clone node may be serving by adversary in the network at anywhere.
III. Proposed Work
3.1 System Architecture
Every time a mobile sensor node moves to a novel location, each of its neighbors asks for a signed
claim containing its location and time information and decides probabilistically whether to forward the received
claim to the base station or not as shown in Figure 3.1.
Figure 3.1: System Architecture
The base station computes the rate from every two consecutive claims of a mobile node and performs
the sequential probability ratio test (SPRT) by considering speed as an observed sample. There is little benefit to
the attacker of having a replica node in the same area as another compromised node. The compromised node can
straightly report fake data, participate in local control protocol. Algorithm used for the proposed scheme is:
Step 1: Let the number of Nodes be n, current_locationbe L and current_time be T
Step 2: If Node n>0, compute speed for current_location L1, current_time T1 (n) and previous_location L0 and
previous time T0 (n)
Step 3: If speed >Vmax, then replica detected
Step 4: Else accept test and terminate
Step 5: Prev_loc=cur_loc
Prev_time = cur_time
Step6: Else go to step2
The flow of data for proposed scheme is shown in Figure 3.2.
Each time a mobile sensor node u moves to a new location, Lu represents the location of node u and then
discovers a set of nearby nodes N (u). Each neighboring node v ∈ N (u) asks for a true location claim from node
u by sending its current time T to node u.After receiving T, node u checks whether T is valid or not. If yes then
it proceed towards the location detection and finally it monitor the nodes.
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 95 | Page
Figure 3.2: Data Flow for Proposed Work
3.2 Formulation for replica node detection and revocation
On receiving a location claim from node u, the base station verifies the authenticity of the claim with
the public key of u and discards the claim if it is not genuine. We indicate the genuine claims from node u by
C1
u, C2
u,…, Cn
u.. The base station extracts location information Li
u and time information Ti from claim Ci
u. Let di
denote the euclidean distance from location Li
u at time Ti to Li+1
u at Ti+1
. Let 0i denote the measured speed at time
Ti+1, where i=1, 2,…, n.
0i =
di
│Ti+1−Ti│
………………… (1)
Let Si denotes a Bernoulli random variable defined as
S=
0 if0i ≤ Vmax
1if 0i > Vmax
………………… (2)
Then, the success probability λ of the Bernouli distribution is
Pr si = 1 = 1 − Pr si = 0 = λ … … … … … (3)
Also the log–probability ratio on η samples which is given by
Ln = ln pr S1…..,Sn│ H1
pr S1…..,Sn│ H0
……………………… (4)
If Si is independent and identically distributed, then Ln can be rewritten as
Ln = ln
Π
i=1pr Si H1
n
Π
i=1pr Si H0
n = ln
P
r Si H1
Pr Si H0
n
i …………… (5)
Letωn denote the number of times that Si =1 in the n samples, we contain
Ln = ωnln
λ1
λ0
+ n − ωn ln 1−λ 1
1−λ 0
…………… (6)
Whereλ0 = Pr Si = 1 H0
Detection of Replica Nodes in Wireless Sensor Network: A Survey
DOI: 10.9790/0661-17129296 www.iosrjournals.org 96 | Page
The λ0 must be configured in accord with the possibility of the occurrence that a kindly node’s
measured speed exceeds Vmaxdue to time synchronization and localization errors. On the other hand,λ1should
be configured to consider the possibility of the occurrence that replica nodes measured speeds exceedsVmax.
While the former possibility is lower than the latter one, λ0should be set lower thanλ1.
IV. Conclusion
The Proposed replica node detection scheme for mobile sensor network is based on the sequential
probability ratio test. It can limit the amount of time for which a group of replicas can avoid detection and
quarantine. Proposed model also contain interaction between the detector and the adversary. The proposed
replica node detection with sequential hypothesis testing in wireless sensor networks can quickly detect mobile
replica nodes as compared to existing techniques.
References
[1]. Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In Security
and Privacy, 2005 IEEE Symposium on, pp. 49-63. IEEE, 2005.
[2]. Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol
for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium
on Mobile ad hoc networking and computing, pp. 80-89.ACM, 2007.
[3]. Xing, Kai, Fang Liu, Xiuzhen Cheng, and David Hung-Chang Du. "Real-time detection of clone attacks inwireless sensor
networks." In Distributed Computing Systems, 2008.ICDCS'08. The 28th International Conference on, pp. 3-10. IEEE, 2008.
[4]. Wald, Abraham. Sequential analysis. Courier Corporation, 1973.
[5]. Jung, Jaeyeon, Vern Paxson, Arthur W. Berger, and HariBalakrishnan. "Fast portscan detection using sequential hypothesis testing."
In Security and Privacy, 2004.Proceedings. 2004 IEEE Symposium on, pp. 211-225. IEEE, 2004.
[6]. Sundararaman, Bharath, Ugo Buy, and Ajay D. Kshemkalyani. "Clock synchronization for wireless sensor networks: a survey." Ad
Hoc Networks 3, no. 3 (2005): 281-323.
[7]. Song, Hui, Sencun Zhu, and Guohong Cao. "Attack-resilient time synchronization for wireless sensor networks."Ad Hoc Networks
5, no. 1 (2007): 112-125.
[8]. Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in
Communications Networks and the Workshops, 2007.SecureComm 2007. Third International Conference on, pp. 341-350. IEEE,
2007.

Contenu connexe

Tendances

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall forijistjournal
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 

Tendances (17)

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall for
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 

En vedette (20)

F013123542
F013123542F013123542
F013123542
 
D017332126
D017332126D017332126
D017332126
 
A1803060110
A1803060110A1803060110
A1803060110
 
J1802048185
J1802048185J1802048185
J1802048185
 
F017443745
F017443745F017443745
F017443745
 
H017164955
H017164955H017164955
H017164955
 
M010438187
M010438187M010438187
M010438187
 
D012661723
D012661723D012661723
D012661723
 
C012311114
C012311114C012311114
C012311114
 
A018130110
A018130110A018130110
A018130110
 
B013160914
B013160914B013160914
B013160914
 
E1803012329
E1803012329E1803012329
E1803012329
 
G018214246
G018214246G018214246
G018214246
 
D1803052831
D1803052831D1803052831
D1803052831
 
C1303020912
C1303020912C1303020912
C1303020912
 
K1303037582
K1303037582K1303037582
K1303037582
 
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
 
A1303040108
A1303040108A1303040108
A1303040108
 
F1302022933
F1302022933F1302022933
F1302022933
 
Q01262105114
Q01262105114Q01262105114
Q01262105114
 

Similaire à Detection of Replica Nodes in Wireless Sensor Network: A Survey

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 

Similaire à Detection of Replica Nodes in Wireless Sensor Network: A Survey (20)

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
18
1818
18
 
O010528791
O010528791O010528791
O010528791
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
D0952126
D0952126D0952126
D0952126
 
B43040610
B43040610B43040610
B43040610
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Dernier (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Detection of Replica Nodes in Wireless Sensor Network: A Survey

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 92-96 www.iosrjournals.org DOI: 10.9790/0661-17129296 www.iosrjournals.org 92 | Page Detection of Replica Nodes in Wireless Sensor Network: A Survey Sandip D. Girase1 , Ashish T. Bhole2 1,2 Department of Computer Engineering, SSBT’s College Of Engineering & Technology, Jalgaon, Maharashtra, India Abstract: Network security has become a challenging area, historically only tackled by well qualified and familiar experts. Although more pupils are becoming wired, an increasing number of pupils need to understand basics of security in the network world. The paper is written from the prospective of the basic computer user and information systems administrator, illuminating the concepts needed to go through the hype in the marketplace and understand risks and to deal with them. The replica node attacks are hazardous as they allow the attacker to leverage the compromise of a few nodes exert control over much of the network. Earlier work on replica node recognition relies on set sensor locations and hence do not work in mobile sensor network. The paper proposes sequential probability ratio test for detection of mobile replica node. It provides unique id to the sensor nodes so that an adversary can not disturb the network. The proposed sequential hypothesis testing can result in a fast and effective detection of mobile replica nodes within wireless sensor network. Keywords: Wireless sensor network (WSN), network security, attack detection, node replication, tamper resistant hardware, sequential probability ratio test (SPRT) I. Introduction Now a day’s robotics have the advances which is responsible for developing several [1] architecture for autonomous wireless sensor networks. This unattended nature of wireless sensor networks can be exploited by adversaries. The adversaries takes the secret keying materials from a compromised node, generates a huge amount of attacker-controlled replicas that share the node’s keying resources and ID, and then spreads these replicas right through the network. With a particular captured node, the adversary can form as many replica nodes as he has the hardware to generate [8]. One of the solutions for this is the use of tamper-resistance hardware to prevent adversary from extracting the keying material. 1.1 Tamper–resistant hardware For protecting the keys the appropriate way is to store them in a tamper-resistant hardware tool. Such devices can be used for applications ranging from safe e-mail to electronic cash and credit cards. They suggest substantial shield to the keys residing within them, thus providing a few guarantee that these keys have not been maliciously read or modified. Typically in advance access to the contents of a tamper-resistant device requires knowledge of a PIN or password exactly what type of access can be gained with this knowledge is device dependent. 1.2 Sequential hypothesis test The sequential hypothesis testing is statistical analysis where the sample size is not set in progress. as a replacement for data are evaluate as they are collected, and additional sampling is stopped in accordance with a pre-defined stopping rule as soon as significant results are observed. as a result a climax may sometimes be reached at a much earlier stage than would be possible with more classical hypothesis testing or estimation, at consequently lower financial and or individual cost. 1.3 Sequential probability ratio test The sequential probability ratio test (SPRT) is a specific [4] sequential hypothesis test which is developed for use in quality control studies in the realm of mechanized, SPRT have been formulate used for use in the computerized testing of human examinees as a termination criterion .It is nothing but a statistical hypothesis test which is a method of making decision by means of data, whether commencing a forbidden experimentation or an observational lessons. In information, a result is called statistically significant if it is unlikely to have occurred by probability alone, according to a fixed threshold probability, the significance level. These tests are used in determining what outcomes of an experiment would lead to a rejection of the null hypothesis for a pre-specified level of significance helping to decide whether experimental results contain enough information to cast doubt on conventional wisdom. It is occasionally called assenting data investigation, in difference to investigative data analysis. Statistical hypothesis testing is a key technique of frequents
  • 2. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 93 | Page statistical inference. The critical region of a hypothesis test is the set of all outcomes which cause the null hypothesis to be rejected in support of the alternative hypothesis. 1.4 Null hypothesis The null hypothesis is nothing but a typically corresponds to a general or default position Null hypothesis is typically paired with a subsequent assumption, the substitute hypothesis, which assert a particular relationship between the phenomena. The substitute need not be the reasonable negation of the null hypothesis it predicts the results from the experiment if the substitute assumption is true. The use of substitute hypotheses was not part of Fisher's formulation, but became standard. It is important to understand that the null hypothesis can never be expanded beyond the doubt. A set of data can only reject a null hypothesis or fail to reject it. For instance, if similarity of two groups. Null hypothesis can be work by collecting data and measuring how likely the particular set of data is, assuming the null hypothesis is true. The null hypothesis (H0) choice and consideration of directionality is critical. 1.5 Alternative hypothesis The alternative hypothesis (or maintained hypothesis or research hypothesis and the null hypothesis are the two rival hypotheses which are compared by a statistical hypothesis test. Sequential probability is a statistical decision process. It consists of one dimensional random walk with lower and upper limit [5]. A random walk is a mathematical formalization of a path which consists of a succession of random steps. II. Related Work 2.1 Attack Resilient Time Synchronization in Wireless Sensor Network In 2006, H. Song, S. Zhu, and G. Cao the time synchronization in wireless sensor network for attack resilient. In the sensor network application required time to be synchronized within the network [7]. For instance the applications include mobile object tracking, data aggregation, TDMA radio arrangement, and message ordering, to name a few. a sensor network is deployed in an area of interest to monitor passing objects which is the application of mobile object tracking. The detecting nodes record the detecting location and the detecting time, object is papering. Later, these location and time information are sent to the aggregation node which estimates the moving trajectory of the object [6]. Without accurate time synchronization, the estimated trajectory of the tracked object could differ greatly from the actual one. It also covers the network time synchronization method relay on message exchange between the nodes. Paper also gives important on the receiver –receiver model reference broadcast synchronization scheme (RBS) and its prototypes are used. 2.2 A Randomized, Efficient and Distributed Protocol In 2007, M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, discovered the RED protocol for detection of replication attack in wireless sensor network. The randomized, efficient and distributed protocol is highly efficient as compared to other distributed protocol in the sense of communication, memory and computation [2]. In this every claim message of node is signed with its private key ,which allows other nodes to identify any malicious node not abiding to the protocol .It also allows adversary to know the witness set for any given ID. But the witness of the node will be any were in the network and it change at every protocol iteration I unpredicted way .In order to prevent RED from detecting the replicas it is required to be ubiquitous and to capture all the witness of the cloned nodes within a window period which can be at most share among the disclosure of rand and next protocol invocation. By considering adversary movement speed and realistic network size, it admires that few chances for the adversary to perform the same attack. RED performs the requirement that are area-obliviousness, ID-obliviousness ,low overhead, over head balancing and high replica attack detection probability .Consider the simulation in that n=1,000 nodes in the network, r=0.1 communication radius, g=1 and p=0.1 for the red protocol. 2.3 Distributed Detection of Node Attacks with Deployment Knowledge The idea behind the scheme is to have nodes report location claims, which identify their positions and attempt to detect conflicting information that single one node in more than one location. For this, every node should have location claims and verify and store signed location claims of every other node .It gives the idea behind it that every node should be deploy in groups so that every node should know the information of every other node .sensors can be pre-located even if sensors can be dropped from airplanes or scattered over an area by hand (2009).Nodes are deployed in groups allow most nodes to communicate without generating any location claims as long as they are able to directly send messages to at least one of their group members. This simple idea allows us to significantly reduce the overhead of sending, receiving, and verifying location claims [1]. Additionally, if we assume loose time synchronization for the sensors, we can allow nodes to accept messages from any node that has been deployed within a small window of its expected deployment time.
  • 3. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 94 | Page 2.4 Real Time Clone Detection In 2008 K. Xing, F. Liu, X. Cheng, and H.C. Du proposed the scheme clone attack detection in wireless sensor network. In this scheme a social fingerprint is computed for each sensor by using the neighborhood characteristics, and checks the legitimacy of the originator for each message by checking the enclosed fingerprint. Generation of fingerprint is depends on the superimposed s-disjunct code, which incurs a incredibly illumination communication and computation overhead. The checking of fingerprint is conducted at both the base station as well as the nearby sensors, which ensures high detection likelihood. It also provides the real time clone detection in efficient as well as effective way. Unlimited clones were deploying by capturing and compromise nodes [3]. These nodes can be involve such as that of legitimate node and have access the legitimate IDs and keys .If these remains inside the network and left undetected then the network get unshielded to attackers and clone attackers are spread over the entire network. Smart clone may try to hide from being detected by all means. So far they may collude to cheat the network administrator into believing that they are legitimate. Clone node may be serving by adversary in the network at anywhere. III. Proposed Work 3.1 System Architecture Every time a mobile sensor node moves to a novel location, each of its neighbors asks for a signed claim containing its location and time information and decides probabilistically whether to forward the received claim to the base station or not as shown in Figure 3.1. Figure 3.1: System Architecture The base station computes the rate from every two consecutive claims of a mobile node and performs the sequential probability ratio test (SPRT) by considering speed as an observed sample. There is little benefit to the attacker of having a replica node in the same area as another compromised node. The compromised node can straightly report fake data, participate in local control protocol. Algorithm used for the proposed scheme is: Step 1: Let the number of Nodes be n, current_locationbe L and current_time be T Step 2: If Node n>0, compute speed for current_location L1, current_time T1 (n) and previous_location L0 and previous time T0 (n) Step 3: If speed >Vmax, then replica detected Step 4: Else accept test and terminate Step 5: Prev_loc=cur_loc Prev_time = cur_time Step6: Else go to step2 The flow of data for proposed scheme is shown in Figure 3.2. Each time a mobile sensor node u moves to a new location, Lu represents the location of node u and then discovers a set of nearby nodes N (u). Each neighboring node v ∈ N (u) asks for a true location claim from node u by sending its current time T to node u.After receiving T, node u checks whether T is valid or not. If yes then it proceed towards the location detection and finally it monitor the nodes.
  • 4. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 95 | Page Figure 3.2: Data Flow for Proposed Work 3.2 Formulation for replica node detection and revocation On receiving a location claim from node u, the base station verifies the authenticity of the claim with the public key of u and discards the claim if it is not genuine. We indicate the genuine claims from node u by C1 u, C2 u,…, Cn u.. The base station extracts location information Li u and time information Ti from claim Ci u. Let di denote the euclidean distance from location Li u at time Ti to Li+1 u at Ti+1 . Let 0i denote the measured speed at time Ti+1, where i=1, 2,…, n. 0i = di │Ti+1−Ti│ ………………… (1) Let Si denotes a Bernoulli random variable defined as S= 0 if0i ≤ Vmax 1if 0i > Vmax ………………… (2) Then, the success probability λ of the Bernouli distribution is Pr si = 1 = 1 − Pr si = 0 = λ … … … … … (3) Also the log–probability ratio on η samples which is given by Ln = ln pr S1…..,Sn│ H1 pr S1…..,Sn│ H0 ……………………… (4) If Si is independent and identically distributed, then Ln can be rewritten as Ln = ln Π i=1pr Si H1 n Π i=1pr Si H0 n = ln P r Si H1 Pr Si H0 n i …………… (5) Letωn denote the number of times that Si =1 in the n samples, we contain Ln = ωnln λ1 λ0 + n − ωn ln 1−λ 1 1−λ 0 …………… (6) Whereλ0 = Pr Si = 1 H0
  • 5. Detection of Replica Nodes in Wireless Sensor Network: A Survey DOI: 10.9790/0661-17129296 www.iosrjournals.org 96 | Page The λ0 must be configured in accord with the possibility of the occurrence that a kindly node’s measured speed exceeds Vmaxdue to time synchronization and localization errors. On the other hand,λ1should be configured to consider the possibility of the occurrence that replica nodes measured speeds exceedsVmax. While the former possibility is lower than the latter one, λ0should be set lower thanλ1. IV. Conclusion The Proposed replica node detection scheme for mobile sensor network is based on the sequential probability ratio test. It can limit the amount of time for which a group of replicas can avoid detection and quarantine. Proposed model also contain interaction between the detector and the adversary. The proposed replica node detection with sequential hypothesis testing in wireless sensor networks can quickly detect mobile replica nodes as compared to existing techniques. References [1]. Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In Security and Privacy, 2005 IEEE Symposium on, pp. 49-63. IEEE, 2005. [2]. Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 80-89.ACM, 2007. [3]. Xing, Kai, Fang Liu, Xiuzhen Cheng, and David Hung-Chang Du. "Real-time detection of clone attacks inwireless sensor networks." In Distributed Computing Systems, 2008.ICDCS'08. The 28th International Conference on, pp. 3-10. IEEE, 2008. [4]. Wald, Abraham. Sequential analysis. Courier Corporation, 1973. [5]. Jung, Jaeyeon, Vern Paxson, Arthur W. Berger, and HariBalakrishnan. "Fast portscan detection using sequential hypothesis testing." In Security and Privacy, 2004.Proceedings. 2004 IEEE Symposium on, pp. 211-225. IEEE, 2004. [6]. Sundararaman, Bharath, Ugo Buy, and Ajay D. Kshemkalyani. "Clock synchronization for wireless sensor networks: a survey." Ad Hoc Networks 3, no. 3 (2005): 281-323. [7]. Song, Hui, Sencun Zhu, and Guohong Cao. "Attack-resilient time synchronization for wireless sensor networks."Ad Hoc Networks 5, no. 1 (2007): 112-125. [8]. Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in Communications Networks and the Workshops, 2007.SecureComm 2007. Third International Conference on, pp. 341-350. IEEE, 2007.