Node clone detection using a stable overlay network
Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversa...
Gespeichert in:
Veröffentlicht in: | International journal of electrical and computer engineering (Malacca, Malacca) Malacca), 2020-02, Vol.10 (1), p.316 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | 316 |
container_title | International journal of electrical and computer engineering (Malacca, Malacca) |
container_volume | 10 |
creator | Chelliah, Balika J. Vigil, M. S. Antony Praba, M. S. Bennet |
description | Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption. |
doi_str_mv | 10.11591/ijece.v10i1.pp316-322 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2391262329</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2391262329</sourcerecordid><originalsourceid>FETCH-LOGICAL-c145t-ae1a6e000d38d1cd360b7ea735af45307bbab277ee77dfa71810287e6396306f3</originalsourceid><addsrcrecordid>eNpN0E1LxDAQBuAgCi7r_gUJeG7NZLZJepTFL1j0oueQtlNprU1N2pX995auB-cyc3iZFx7GrkGkAFkOt01LJaUHEA2kw4CgEpTyjK2kMCYxWpjzf_cl28TYinmMUjLPVgxffEW87HxPvKKRyrHxPZ9i039wx-Poio64P1Do3JH3NP748HnFLmrXRdr87TV7f7h_2z0l-9fH593dPilhm42JI3CK5q4KTQVlhUoUmpzGzNXbDIUuCldIrYm0rmqnwYCQRpPCXKFQNa7ZzenvEPz3RHG0rZ9CP1daiTlIJVHmc0qdUmXwMQaq7RCaLxeOFoRdjOxiZBcjuxjZ2Qh_AbcxW9c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2391262329</pqid></control><display><type>article</type><title>Node clone detection using a stable overlay network</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</creator><creatorcontrib>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</creatorcontrib><description>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</description><identifier>ISSN: 2088-8708</identifier><identifier>EISSN: 2088-8708</identifier><identifier>DOI: 10.11591/ijece.v10i1.pp316-322</identifier><language>eng</language><publisher>Yogyakarta: IAES Institute of Advanced Engineering and Science</publisher><subject>Cloning ; Nodes ; Wireless sensor networks</subject><ispartof>International journal of electrical and computer engineering (Malacca, Malacca), 2020-02, Vol.10 (1), p.316</ispartof><rights>Copyright IAES Institute of Advanced Engineering and Science Feb 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Chelliah, Balika J.</creatorcontrib><creatorcontrib>Vigil, M. S. Antony</creatorcontrib><creatorcontrib>Praba, M. S. Bennet</creatorcontrib><title>Node clone detection using a stable overlay network</title><title>International journal of electrical and computer engineering (Malacca, Malacca)</title><description>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</description><subject>Cloning</subject><subject>Nodes</subject><subject>Wireless sensor networks</subject><issn>2088-8708</issn><issn>2088-8708</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpN0E1LxDAQBuAgCi7r_gUJeG7NZLZJepTFL1j0oueQtlNprU1N2pX995auB-cyc3iZFx7GrkGkAFkOt01LJaUHEA2kw4CgEpTyjK2kMCYxWpjzf_cl28TYinmMUjLPVgxffEW87HxPvKKRyrHxPZ9i039wx-Poio64P1Do3JH3NP748HnFLmrXRdr87TV7f7h_2z0l-9fH593dPilhm42JI3CK5q4KTQVlhUoUmpzGzNXbDIUuCldIrYm0rmqnwYCQRpPCXKFQNa7ZzenvEPz3RHG0rZ9CP1daiTlIJVHmc0qdUmXwMQaq7RCaLxeOFoRdjOxiZBcjuxjZ2Qh_AbcxW9c</recordid><startdate>20200201</startdate><enddate>20200201</enddate><creator>Chelliah, Balika J.</creator><creator>Vigil, M. S. Antony</creator><creator>Praba, M. S. Bennet</creator><general>IAES Institute of Advanced Engineering and Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200201</creationdate><title>Node clone detection using a stable overlay network</title><author>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c145t-ae1a6e000d38d1cd360b7ea735af45307bbab277ee77dfa71810287e6396306f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Cloning</topic><topic>Nodes</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Chelliah, Balika J.</creatorcontrib><creatorcontrib>Vigil, M. S. Antony</creatorcontrib><creatorcontrib>Praba, M. S. Bennet</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East & South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chelliah, Balika J.</au><au>Vigil, M. S. Antony</au><au>Praba, M. S. Bennet</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Node clone detection using a stable overlay network</atitle><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle><date>2020-02-01</date><risdate>2020</risdate><volume>10</volume><issue>1</issue><spage>316</spage><pages>316-</pages><issn>2088-8708</issn><eissn>2088-8708</eissn><abstract>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</abstract><cop>Yogyakarta</cop><pub>IAES Institute of Advanced Engineering and Science</pub><doi>10.11591/ijece.v10i1.pp316-322</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2088-8708 |
ispartof | International journal of electrical and computer engineering (Malacca, Malacca), 2020-02, Vol.10 (1), p.316 |
issn | 2088-8708 2088-8708 |
language | eng |
recordid | cdi_proquest_journals_2391262329 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Cloning Nodes Wireless sensor networks |
title | Node clone detection using a stable overlay network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T11%3A52%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Node%20clone%20detection%20using%20a%20stable%20overlay%20network&rft.jtitle=International%20journal%20of%20electrical%20and%20computer%20engineering%20(Malacca,%20Malacca)&rft.au=Chelliah,%20Balika%20J.&rft.date=2020-02-01&rft.volume=10&rft.issue=1&rft.spage=316&rft.pages=316-&rft.issn=2088-8708&rft.eissn=2088-8708&rft_id=info:doi/10.11591/ijece.v10i1.pp316-322&rft_dat=%3Cproquest_cross%3E2391262329%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2391262329&rft_id=info:pmid/&rfr_iscdi=true |