Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

4
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE - 2010 ABSTRACT: Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these replicas can be used to launch a variety of attacks that undermine many sensor applications and protocols. In this paper, we present a novel distributed approach called Localized Multicast for detecting node replication attacks. The efficiency and security of our approach are evaluated both theoretically and via simulation. Our results show that, compared to previous distributed approaches proposed by Parno et al., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time achieves a higher probability of detecting node replicas. EXISTING SYSTEM: In our existing system, sensor networks lacks in security and are vulnerable to capture and compromise by an adversary. Once an adversary has obtained the credentials of a sensor node, it can surreptitiously insert replicas of that node at strategic locations within the network. These replicas can be used to launch a variety of insidious and hard-to-detect attacks on the sensor application and the underlying networking protocols. This type of attack is called a node

Transcript of Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

Page 1: Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor

Networks.IEEE - 2010

ABSTRACT:

Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these replicas can be used to launch a variety of attacks that undermine many sensor applications and protocols. In this paper, we present a novel distributed approach called Localized Multicast for detecting node replication attacks. The efficiency and security of our approach are evaluated both theoretically and via simulation. Our results show that, compared to previous distributed approaches proposed by Parno et al., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time achieves a higher probability of detecting node replicas.

EXISTING SYSTEM:

• In our existing system, sensor networks lacks in security and are vulnerable to capture and compromise by an adversary. Once an adversary has obtained the credentials of a sensor node, it can surreptitiously insert replicas of that node at strategic locations within the network.

• These replicas can be used to launch a variety of insidious and hard-to-detect attacks on the sensor application and the underlying networking protocols. This type of attack is called a node

Page 2: Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

replication attack. This mechanism can be used to launch a variety of attacks that undermine many sensor applications and protocols.

• Localized Multicast is not that much efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time it achieves only a lower probability of detecting node replicas.

DISADVANTAGES:

• The main disadvantage in the system is the sensor networks lacks in security and is vulnerable to capture and compromise by an adversary.

• The adversary can easily insert replicas at any location in the network.

• Many hard-to-detect attacks are possible.• Node replication attack launches a variety of attacks in many

sensor applications and protocols.

PROPOSED SYSTEM:

• In the proposed system, we present a novel distributed approach called Localized Multicast for detecting node replication attacks.

• In this approach the witness nodes for a node identity are randomly selected from the nodes that are located within a geographically limited region.

• Our approach first deterministically maps a node’s ID to one or more cells, and then uses randomization within the cell to increase the resilience and security of the scheme.

Page 3: Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

• In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network.

• The efficiency and security of our approach are evaluated both theoretically and via simulation.

• Thus the Proposed System shows that, compared to previous distributed approaches., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time it achieves a higher probability of detecting node replicas.

ADVANATGES:

• One major advantage of our approach is that the probability of detecting node replicas is much higher than that achieved in previous cases.

• The Distributed protocol used in detecting node replicas is to minimize communication.

• Also the protocol minimizes the memory requirements per node.

• Localized Multicast is more efficient in terms of communication and memory costs.

• A higher probability is achieved during detecting node replicas.

• Localized Multicast also achieves a higher level of security in terms of the capability of detecting node replicas.

Page 4: Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.

KEY TERMS:

• Wireless sensor networks security• Node replication attack detection• Distributed protocol• Efficiency.

SYSTEM CONFIGURATION:

HARDWARE CONFIGURATION

Hard disk : 80 GB

RAM : 512MB

Processor : Pentium IV

Monitor : 17’’Color Monitor

SOFTWARE CONFIGURATION

Front-End : VS .NET 2010

Coding Language : C#

Operating System : Windows XP.

Back End : SQLSERVER 2008