A Novel Attack Detection in Wireless Sensor Networks by Using Sequential Probability Ratio Test

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :S. Udaya Sankar, Dr.K.P.Kaliyamurthie

MLA

S. Udaya Sankar, Dr.K.P.Kaliyamurthie "A Novel Attack Detection in Wireless Sensor Networks by Using Sequential Probability Ratio Test"International Journal of Computer Trends and Technology (IJCTT),V4(6):1923-1927 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - The main objective of this project is to give security against attacks in the Wireless Sensor Networks (WSNs).One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. Therefore first, the desirable properties of a distributed mechanism for the detection of node Clone attacks have been analyzed. Second, the known solutions for this problem do not completely meet our requirements. In this work, we propose a fast and effective mobile replication node detection scheme using Sequential probability Ratio Test..

 

References-
[1] Jun-Won Ho, Mathew Wright and Sajal K.Das (2011), „Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing?, IEEE Transactions on Mobile computing.
[2] J.-Y.L. Boudec and M. Vojnovi_c, “Perfect Simulation and Stationary of a Class of Mobility Models,” Proc. IEEE INFOCOM,pp. 2743-2754, Mar. 2005.pp. 2743-2754, Mar. 2005.
[3] S. Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.
[4] M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, “A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks,” Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
[5] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G.S.Sukhatme, “Robomote: Enabling Mobility in Sensor Networks,”Proc. Fourth IEEE Int?l Symp. Information Processing in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.
[6] J. Ho, M. Wright, and S.K. Das, “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,”Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
[7] J. Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks, “Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
[8] L. Hu and D. Evans, “Localization for Mobile Sensor Networks,”Proc. ACM MobiCom, pp. 45-57, Sept. 2004.
[9] J.Jung,V. Paxon, A.W. Berger,andH.Balakrishnan,“Fast Portscan Detection Using Sequential Hypothesis Testing,” Proc.IEEE Symp. Security and Privacy, pp. 211-225, May 2004.
[10] K. Xing, F. Liu, X. Cheng, and H.C. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks,” Proc. IEEE Int?l Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.

Keywords : Sequential Analysis, Replica detection, Wireless sensor network.