Open Access Open Access  Restricted Access Subscription Access

Detecting Node Masquerade Attack using RLE Method


Affiliations
1 School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India
 

Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we propose a method named as Detecting Node Masquerade Attack using RLE Method which is used for detecting a clone in the network using RLE method. The main goal of our proposed protocol is to detect the replica of the nodes i.e. clones in the network on the basis of RLE method. RLE method is abbreviated as RSSI and List Exchange method i.e. R represents RSSI means received signal strength indicator. After that we also compare our proposed protocol with the known method i.e. Hip-Hop protocols which are also used to find a clone in mobile WSN and our simulation shows that our proposed protocol outperforms the existing approach in terms of detection rate and time taken to detect a clone. In future work, we can also use a clustering protocol to make this work more efficient.

Keywords

Reprogramming, Security, Sensor Networks
User

Abstract Views: 121

PDF Views: 0




  • Detecting Node Masquerade Attack using RLE Method

Abstract Views: 121  |  PDF Views: 0

Authors

Rimple Manni
School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India
Lavish Kansal
School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India

Abstract


Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we propose a method named as Detecting Node Masquerade Attack using RLE Method which is used for detecting a clone in the network using RLE method. The main goal of our proposed protocol is to detect the replica of the nodes i.e. clones in the network on the basis of RLE method. RLE method is abbreviated as RSSI and List Exchange method i.e. R represents RSSI means received signal strength indicator. After that we also compare our proposed protocol with the known method i.e. Hip-Hop protocols which are also used to find a clone in mobile WSN and our simulation shows that our proposed protocol outperforms the existing approach in terms of detection rate and time taken to detect a clone. In future work, we can also use a clustering protocol to make this work more efficient.

Keywords


Reprogramming, Security, Sensor Networks



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i33%2F128133