Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
-
Upload
latha-shankar -
Category
Documents
-
view
35 -
download
3
Transcript of Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor
Networks.IEEE - 2010
ABSTRACT:
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these replicas can be used to launch a variety of attacks that undermine many sensor applications and protocols. In this paper, we present a novel distributed approach called Localized Multicast for detecting node replication attacks. The efficiency and security of our approach are evaluated both theoretically and via simulation. Our results show that, compared to previous distributed approaches proposed by Parno et al., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time achieves a higher probability of detecting node replicas.
EXISTING SYSTEM:
• In our existing system, sensor networks lacks in security and are vulnerable to capture and compromise by an adversary. Once an adversary has obtained the credentials of a sensor node, it can surreptitiously insert replicas of that node at strategic locations within the network.
• These replicas can be used to launch a variety of insidious and hard-to-detect attacks on the sensor application and the underlying networking protocols. This type of attack is called a node
replication attack. This mechanism can be used to launch a variety of attacks that undermine many sensor applications and protocols.
• Localized Multicast is not that much efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time it achieves only a lower probability of detecting node replicas.
DISADVANTAGES:
• The main disadvantage in the system is the sensor networks lacks in security and is vulnerable to capture and compromise by an adversary.
• The adversary can easily insert replicas at any location in the network.
• Many hard-to-detect attacks are possible.• Node replication attack launches a variety of attacks in many
sensor applications and protocols.
PROPOSED SYSTEM:
• In the proposed system, we present a novel distributed approach called Localized Multicast for detecting node replication attacks.
• In this approach the witness nodes for a node identity are randomly selected from the nodes that are located within a geographically limited region.
• Our approach first deterministically maps a node’s ID to one or more cells, and then uses randomization within the cell to increase the resilience and security of the scheme.
• In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network.
• The efficiency and security of our approach are evaluated both theoretically and via simulation.
• Thus the Proposed System shows that, compared to previous distributed approaches., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time it achieves a higher probability of detecting node replicas.
ADVANATGES:
• One major advantage of our approach is that the probability of detecting node replicas is much higher than that achieved in previous cases.
• The Distributed protocol used in detecting node replicas is to minimize communication.
• Also the protocol minimizes the memory requirements per node.
• Localized Multicast is more efficient in terms of communication and memory costs.
• A higher probability is achieved during detecting node replicas.
• Localized Multicast also achieves a higher level of security in terms of the capability of detecting node replicas.
KEY TERMS:
• Wireless sensor networks security• Node replication attack detection• Distributed protocol• Efficiency.
SYSTEM CONFIGURATION:
HARDWARE CONFIGURATION
Hard disk : 80 GB
RAM : 512MB
Processor : Pentium IV
Monitor : 17’’Color Monitor
SOFTWARE CONFIGURATION
Front-End : VS .NET 2010
Coding Language : C#
Operating System : Windows XP.
Back End : SQLSERVER 2008