
Node clone detection using a stable overlay network
Author(s) -
Balika J. Chelliah,
M. S. Antony Vigil,
M. S. Bennet Praba
Publication year - 2020
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
ISSN - 2088-8708
DOI - 10.11591/ijece.v10i1.pp316-322
Subject(s) - computer network , computer science , overlay network , wireless sensor network , node (physics) , clone (java method) , overlay , adversary , distributed computing , computer security , engineering , the internet , dna , structural engineering , biology , world wide web , genetics , programming language
Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.