Performance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks, pdfkeywords=wireless sensor network (WSN), clone attack, intrusion detection, mobility
نویسندگان
چکیده
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended protocols in this area have not been experimentalised, also no comprehensive study has been performed on the possibility and capability of these procedures; in this paper all types of sensor network architecture, with the presence of mobile sensor node, are analyzed. Then according to the type of architecture, the procedures of clone node intrusion detection is classified and meticulously scrutinized. Besides, due to measuring the efficiency, exploiting the optimum parameters and also appraising the expenses of procedures, via using OMNeT++ simulator, these procedures are analyzed by comprehensive simulation. Finally, the conclusion based on theoretical analysis and simulation is presented.
منابع مشابه
A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملPerformance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملClassification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of re...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013