Skip to main content

Wireless Sensor-Based Enhanced Security Protocol to Prevent Node Cloning Attack

  • Conference paper
  • First Online:
Computational Vision and Bio-Inspired Computing

Abstract

Wireless sensor network is the collection of low-power, independent wireless sensor node. Wireless sensor networks are generally deployed in mission-critical environment like battlefield surveillance, industrial process monitoring, etc. The nodes in the network are generally unattended by humans and hostile environment in which they are deployed to make the node vulnerable to many security attacks. One such attack is the node cloning attack, where the attacker will create the clone or replica of Legitimate Node by copying its cryptographic information into the clone node. Using the copied cryptographic information, clone node can further launch range of attacks in network like eavesdropping or raising false alarm, etc. In this paper, we have discussed the security protocol to prevent the clone node from implementing any successful attack in network. The security protocol is designed in such a way that it prevents the attacker from gaining the required cryptographic information. This is achieved by storing the partial cryptographic information which can only be completed by Legitimate Node. Node will be using location-based information to generate complete cryptographic information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kulkarni, N., et al.: EEHRP: energy efficient hybrid routing protocol for wireless sensor networks. J. Mob. Multimedia 17(1–3) (2021)

    Google Scholar 

  2. Mostafa, E., et al.: Energy-aware intelligent hybrid routing protocol for wireless sensor networks. Cocurr. Comput. Pract. Exper. (2021).https://doi.org/10.1002/cpe.6601

  3. Pranathi, T.Y.S.S., et al.: A hybrid routing protocol for robust wireless sensor networks. In: 12th International Conference on Computational Intelligence and Communication Networks (CICN), 2020, pp. 102–106. https://doi.org/10.1109/CICN49253.2020.9242627

  4. Raj, J.S.: Improved response time and energy management for mobile cloud computing using computational offloading. J. ISMAC 2(01), 38–49 (2020)

    Google Scholar 

  5. Suma, V., Haoxiang, W.: Optimal key handover management for enhancing security in mobile network. J. Trends Comput. Sci. Smart Technol. (TCSST) 2(04), 181–187 (2020)

    Google Scholar 

  6. Smys, S., Wang, H.: Optimal wireless smart grid networks using duo attack strategy. J. Electr. Eng. Autom. 2(2), 60–67 (2020)

    Google Scholar 

  7. Nurul Islam Khan, M.: A new scheme to detect and prevent node replication attacks for wireless sensor networks. In: International Conference on Computer Communication and Informatics (ICCCI), 2019

    Google Scholar 

  8. Christina, G., Rajeswari, A., Mathivanan, S.: Real time analysis of a 24 GHz planar microstrip antenna for vehicular communications. Springer-Wirel. Pers. Commun. 97(1), 1129–1139 (2017)

    Article  Google Scholar 

  9. Fernandes, G., et al.: Autonomous profile-based anomaly detection system using principal component analysis and flow analysis. Appl. Soft Comput. 34, 513–525 (2015)

    Article  Google Scholar 

  10. Singh, M.M., et al.: Preventing node replication attack in static wireless sensor netwroks”, reliability, ınfocom technologies and optimization (ICRITO) (trends and future directions). In: 2014 3rd International Conference on. IEEE, 2014

    Google Scholar 

  11. Zheng, K., et al.: Algorithms to speedup pattern matching for network intrusion detection systems. Comput. Commun. 62, 47–58 (2015)

    Article  Google Scholar 

  12. Bhuyan et al.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surveys Tutorials Early Access 1, 1–34 (2013)

    Google Scholar 

  13. Mitchell, R., Chen, I.R.: Behavior rule based intrusion detection systems for safety critical smart grid applications. IEEE Trans. Smart Grid 4, 1254–1263 (2013)

    Google Scholar 

  14. Khan, W.Z. et al.: Detection and mitigation of node replication attacks in wireless sensor networks: a survey. Int. J. Distrib. Sensor Netw. 2013 (2013)

    Google Scholar 

  15. Hajibegloo, M., Javadi, A.: Fast Fault detection in wireless sensor networks. In: Digital Information and Communication Technology and it’s Applications (DICTAP) Second International Conference, 2012, pp. 62–66

    Google Scholar 

  16. Anjali, A., Singh, M.: Simulation and performance analysis of AODV, OLSR and GRP routing protocol by considering IEEE 802.11 standard. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(6) (2012)

    Google Scholar 

  17. Badr et al.: Hybrid routing protocol for wireless sensor networks. IJCSI Int. J. Comput. Sci. 9(2) (2012)

    Google Scholar 

  18. Paar, C., Pelzl, J.: Understanding cryptography. Understanding In: Cryptography: A Textbook for Students and Practitioners, 2010. Springer-Verlag, Berlin, Heidelberg. ISBN 978-3-642-04100-6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Santhoshkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Meganathan, S., Rajesh Kumar, N., Sheik Mohideen Shah, S., Sumathi, A., Santhoshkumar, S. (2022). Wireless Sensor-Based Enhanced Security Protocol to Prevent Node Cloning Attack. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds) Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1420. Springer, Singapore. https://doi.org/10.1007/978-981-16-9573-5_43

Download citation

Publish with us

Policies and ethics