首页> 外文期刊>Computer Communications >Protection on Wireless Sensor Network from Clone Attack using the SDN-Enabled Hybrid Clone Node Detection Mechanisms
【24h】

Protection on Wireless Sensor Network from Clone Attack using the SDN-Enabled Hybrid Clone Node Detection Mechanisms

机译:使用支持SDN的混合克隆节点检测机制保护无线传感器网络免受克隆攻击

获取原文
获取原文并翻译 | 示例

摘要

WSN is an infrastructure less network that consists of mobile nodes that communicate with each other over wireless links. WSN is vulnerable to the node replication attack (clone attack). Attackers through compromising one sensor node replicate many clones having the same identity (ID) from the compromised node, and place these clones in various places of network. Clones contain all the credentials of legitimate member so appears authentic. This makes the conventional cryptographic tools useless and clone detection difficult. Once the node replication attack has been successful it can help the attacker to exploit almost all of the network operations, like routing, data collection, and key distribution, and also to help launch various other attacks such as black hole, wormhole etc. This proposed work therefore attempts a SDN based mechanism that implements a network level route analysis and time-based analysis methods which involves a low cost timely monitoring of the environment to identify and avoid redundant nodes which may be caused due to cloning attack. Thus, the SDN based cyber security applications are most useful in this situation. The implementation of this SDN based mechanism in WSN helps in maintaining and improving the QoS (Quality of service) constraints. The hybrid clone node detection (HCND) mechanism helps to detect the clone node present in the wireless network. This is to perform efficient clone detection in such a way to eliminate cloning attack in proactive fashion. To detect clones locally as well as across geographical region through cost effective identity verification procedure. This method helps to protect the wireless sensor network from the node identity replicas using the superimposed SDIS junction code. The node identity replicas help to choose the credible path for successful transmissions. The superimposed method is to be used for retrieval of information from node participating on the network. To thwart cluster of attacks hosted from the clones, by removing the hosting clones. The simulation result shows that there is the performance analysis of various parameters such as false positive, false negative ratio analysis, precision analysis, recall analysis and detection analysis.
机译:WSN是一个无基础架构的网络,由移动节点之间通过无线链路相互通信组成。 WSN容易受到节点复制攻击(克隆攻击)的攻击。攻击者通过破坏一个传感器节点来从受感染节点复制许多具有相同标识(ID)的克隆,并将这些克隆放置在网络的各个位置。克隆包含合法成员的所有凭据,因此看起来是真实的。这使得传统的密码工具无用且克隆检测困难。一旦节点复制攻击成功,它可以帮助攻击者利用几乎所有的网络操作,例如路由,数据收集和密钥分发,还可以帮助发起各种其他攻击,例如黑洞,虫洞等。因此,工作尝试了一种基于SDN的机制,该机制可实现网络级路由分析和基于时间的分析方法,该方法涉及对环境进行低成本及时监控,以识别并避免由于克隆攻击而导致的冗余节点。因此,在这种情况下,基于SDN的网络安全应用程序最为有用。 WSN中这种基于SDN的机制的实现有助于维护和改善QoS(服务质量)约束。混合克隆节点检测(HCND)机制有助于检测无线网络中存在的克隆节点。这是为了以主动方式消除克隆攻击的方式执行有效的克隆检测。通过具有成本效益的身份验证程序来检测本地以及跨地理区域的克隆。此方法有助于使用叠加的SDIS联结码保护无线传感器网络免受节点标识副本的影响。节点身份副本有助于选择成功传输的可信路径。叠加方法将用于从参与网络的节点中检索信息。通过删除托管克隆来阻止从克隆托管的攻击群集。仿真结果表明,对假阳性,假阴性比率分析,精度分析,召回分析和检测分析等各种参数进行了性能分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号