Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 9
Page No. 297 - 304

A Novel Distributed and Secured IRED Protocol for Detecting Node Replication Attack in Wireless Sensor Network

Authors : P. Uma Maheswari and P. Ganesh Kumar

Abstract: Nodes of Wireless Sensor Network (WSN) are often deployed in the antagonistic environment and many nodes are unattended. Due to this nature, nodes are easily tracked by the adversary to initiate clone attack. The clone attack is taken through obtaining the credentials of a node in the WSN. They capture and compromise the node and make replicas of them to launch various attacks through the replicated nodes. The cloned nodes are referred as the clones. The clone attack acts as the basic method to mount a huge insider attack. Therefore, it becomes necessary to detect the cloned nodes that are introduced by the adversary in a sensor network. Many techniques and protocols have been proposed to identify the replicated nodes that are presented in the literature review section. Nevertheless they do not meet the requirements in detecting the attack. To address this issue, researchers of this study have proposed a protocol named Intensified Randomized Efficient Distributed (IRED). The proposed research is carried out in two folds. First, researchers have analyzed the properties of the mechanism for detecting cloned nodes. Second, the researchers have proposed the IRED protocol. The proposed protocol is the enhancement of RED protocol. Here, researchers have focused on preventing the clone attack to pervade. Though the protocol prevents the attack, some attack penetrates into the network. In that scenario, the replicated nodes are detected by IRED. The empirical results show that the proposed protocol IRED has higher resistance against the attack and also performs better in terms of computation, memory and communication.

How to cite this article:

P. Uma Maheswari and P. Ganesh Kumar, 2013. A Novel Distributed and Secured IRED Protocol for Detecting Node Replication Attack in Wireless Sensor Network. Asian Journal of Information Technology, 12: 297-304.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved