Node clone detection using a stable overlay network

Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of electrical and computer engineering (Malacca, Malacca) Malacca), 2020-02, Vol.10 (1), p.316
Hauptverfasser: Chelliah, Balika J., Vigil, M. S. Antony, Praba, M. S. Bennet
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page 316
container_title International journal of electrical and computer engineering (Malacca, Malacca)
container_volume 10
creator Chelliah, Balika J.
Vigil, M. S. Antony
Praba, M. S. Bennet
description Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.
doi_str_mv 10.11591/ijece.v10i1.pp316-322
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2391262329</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2391262329</sourcerecordid><originalsourceid>FETCH-LOGICAL-c145t-ae1a6e000d38d1cd360b7ea735af45307bbab277ee77dfa71810287e6396306f3</originalsourceid><addsrcrecordid>eNpN0E1LxDAQBuAgCi7r_gUJeG7NZLZJepTFL1j0oueQtlNprU1N2pX995auB-cyc3iZFx7GrkGkAFkOt01LJaUHEA2kw4CgEpTyjK2kMCYxWpjzf_cl28TYinmMUjLPVgxffEW87HxPvKKRyrHxPZ9i039wx-Poio64P1Do3JH3NP748HnFLmrXRdr87TV7f7h_2z0l-9fH593dPilhm42JI3CK5q4KTQVlhUoUmpzGzNXbDIUuCldIrYm0rmqnwYCQRpPCXKFQNa7ZzenvEPz3RHG0rZ9CP1daiTlIJVHmc0qdUmXwMQaq7RCaLxeOFoRdjOxiZBcjuxjZ2Qh_AbcxW9c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2391262329</pqid></control><display><type>article</type><title>Node clone detection using a stable overlay network</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</creator><creatorcontrib>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</creatorcontrib><description>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</description><identifier>ISSN: 2088-8708</identifier><identifier>EISSN: 2088-8708</identifier><identifier>DOI: 10.11591/ijece.v10i1.pp316-322</identifier><language>eng</language><publisher>Yogyakarta: IAES Institute of Advanced Engineering and Science</publisher><subject>Cloning ; Nodes ; Wireless sensor networks</subject><ispartof>International journal of electrical and computer engineering (Malacca, Malacca), 2020-02, Vol.10 (1), p.316</ispartof><rights>Copyright IAES Institute of Advanced Engineering and Science Feb 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Chelliah, Balika J.</creatorcontrib><creatorcontrib>Vigil, M. S. Antony</creatorcontrib><creatorcontrib>Praba, M. S. Bennet</creatorcontrib><title>Node clone detection using a stable overlay network</title><title>International journal of electrical and computer engineering (Malacca, Malacca)</title><description>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</description><subject>Cloning</subject><subject>Nodes</subject><subject>Wireless sensor networks</subject><issn>2088-8708</issn><issn>2088-8708</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpN0E1LxDAQBuAgCi7r_gUJeG7NZLZJepTFL1j0oueQtlNprU1N2pX995auB-cyc3iZFx7GrkGkAFkOt01LJaUHEA2kw4CgEpTyjK2kMCYxWpjzf_cl28TYinmMUjLPVgxffEW87HxPvKKRyrHxPZ9i039wx-Poio64P1Do3JH3NP748HnFLmrXRdr87TV7f7h_2z0l-9fH593dPilhm42JI3CK5q4KTQVlhUoUmpzGzNXbDIUuCldIrYm0rmqnwYCQRpPCXKFQNa7ZzenvEPz3RHG0rZ9CP1daiTlIJVHmc0qdUmXwMQaq7RCaLxeOFoRdjOxiZBcjuxjZ2Qh_AbcxW9c</recordid><startdate>20200201</startdate><enddate>20200201</enddate><creator>Chelliah, Balika J.</creator><creator>Vigil, M. S. Antony</creator><creator>Praba, M. S. Bennet</creator><general>IAES Institute of Advanced Engineering and Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200201</creationdate><title>Node clone detection using a stable overlay network</title><author>Chelliah, Balika J. ; Vigil, M. S. Antony ; Praba, M. S. Bennet</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c145t-ae1a6e000d38d1cd360b7ea735af45307bbab277ee77dfa71810287e6396306f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Cloning</topic><topic>Nodes</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Chelliah, Balika J.</creatorcontrib><creatorcontrib>Vigil, M. S. Antony</creatorcontrib><creatorcontrib>Praba, M. S. Bennet</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East &amp; South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chelliah, Balika J.</au><au>Vigil, M. S. Antony</au><au>Praba, M. S. Bennet</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Node clone detection using a stable overlay network</atitle><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle><date>2020-02-01</date><risdate>2020</risdate><volume>10</volume><issue>1</issue><spage>316</spage><pages>316-</pages><issn>2088-8708</issn><eissn>2088-8708</eissn><abstract>Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.</abstract><cop>Yogyakarta</cop><pub>IAES Institute of Advanced Engineering and Science</pub><doi>10.11591/ijece.v10i1.pp316-322</doi></addata></record>
fulltext fulltext
identifier ISSN: 2088-8708
ispartof International journal of electrical and computer engineering (Malacca, Malacca), 2020-02, Vol.10 (1), p.316
issn 2088-8708
2088-8708
language eng
recordid cdi_proquest_journals_2391262329
source EZB-FREE-00999 freely available EZB journals
subjects Cloning
Nodes
Wireless sensor networks
title Node clone detection using a stable overlay network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T11%3A52%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Node%20clone%20detection%20using%20a%20stable%20overlay%20network&rft.jtitle=International%20journal%20of%20electrical%20and%20computer%20engineering%20(Malacca,%20Malacca)&rft.au=Chelliah,%20Balika%20J.&rft.date=2020-02-01&rft.volume=10&rft.issue=1&rft.spage=316&rft.pages=316-&rft.issn=2088-8708&rft.eissn=2088-8708&rft_id=info:doi/10.11591/ijece.v10i1.pp316-322&rft_dat=%3Cproquest_cross%3E2391262329%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2391262329&rft_id=info:pmid/&rfr_iscdi=true