A Lightweight and Reliable Routing Approach for in-Network Aggregation in Wireless Sensor Networks
Keywords:
WSN, Cloning Attack, Man-in-the-Middle Attack, Zero Knowledge ProtocolAbstract
A focal issue in sensor network security is that sensors are defenseless to physical catch attacks. Once a sensor is traded off, the foe can without much of a stretch dispatch clone attacks by reproducing the bargained node, dispersing the clones all through the network, and beginning an assortment of insider attacks. Past conflicts with clone attacks experience the ill effects of either a high correspondence/stockpiling overhead or a poor discovery precision. Wireless Sensor Networks (WSNs) offer an incredible chance to screen conditions, and have a great deal of fascinating applications, some of which are very touchy in nature and require full verification secured condition. The security components utilized for wired networks can't be specifically utilized as a part of sensor networks as there is no user-controlling of every individual node, wireless condition, and all the more significantly, rare vitality assets. In this composition, we address a portion of the extraordinary security dangers and attacks in WSNs. In our proposed work, a novel clone detection framework, called CSI to overcome the previous clone detection problems. We introduce two algorithms are CSI-1 and CSI-2.The CSI-1 (Ordinary Compressed Sensing-Based Approach) algorithm used to construct an aggregation tree. The CSI- 2 (Random Projection-Based Approach) is used to reduce the communication cost. Our proposed CSI method not only achieves lowest communication cost but also manage the network traffic evenly spread over sensor nodes. The presentation and security of CSI will be demonstrated feasibility of clone detection.
References
T. Bonaci, P. Lee, L. Bushnell, and R. Poovendran, “A convex optimization approach for clone detection in wireless sensor networks,” Pervasive Mobile Comput., vol. 9, no. 4, pp. 528–545, 2012.
C. T. Chou, A. Ignjatovic, and W. Hu, “Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults,” in Parallel Distrib. Syst., vol. 24, no. 8, pp. 1525–1534, Aug. 2013.
K. Cho, M. Jo, T. Kwon, H.-H. Chen, and D. H. Lee, “Classification and experimental analysis for clone detection approaches in wireless sensor networks,” in IEEE Syst. vol. 7, no. 1, pp. 26–35, Mar. 2013.
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, “Distributed detection of clone attacks in wireless sensor networks,” IEEE Trans. Dependable Secure Comput., vol. 8, no. 5, pp. 685–698, Sep./Oct. 2011.
H. Chen, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. Sec. Privacy, 2003, pp. 197– 213.
E. J. Candès, J. K. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 489–509, Feb. 2006.
Compressive Sensing Resources [Online]. Available: http://dsp.rice.edu/ cs
H. Choi, S. Zhu, and T. F. La Porta, “SET: Detecting node clones in sensor networks,” in Proc. Int. Conf. Sec. Privacy Commun. Netw. (Securecomm), 2007, pp. 341–350.
Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2003, pp. 1976–1986.
C.M.Yu, C.S.Lu, and S.Y.Kuo, “CSI: Compressed sensing-based clone identification in sensor networks,” in Proc. IEEE Int. Workshop Sensor Netw. Syst. Pervasive Comput. (PerSeNS), 2012, pp. 290–295.
C.M.Yu, Y.T.Tsou, C.S Lu, and S.Y.Kuo, “Localized algorithms for detection of node replication attacks in mobile sensor networks,” IEEE Trans. Inf. Forensics Sec., vol. 8, no. 5, pp. 754–768, May 2013.
B.Yu et al., “Distributed data aggregation scheduling in wireless sensor networks,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2009, pp. 2159–2167.
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: Efficient and distributed replica detection in large-scale sensor networks,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913–926, Jul. 2010.
Y. Zeng et al., “Random-walk based approach to detect clone attacks in wireless sensor networks,” IEEE J. Sel. Areas Commun., vol 28, no. 5, pp. 677–691, Jun. 2010.
M. Zhang, V.Khanapure, S.Chen, and X.Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE Int. Conf. Netw. Protocols (ICNP), 2009, pp. 284–293.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
