Professional Documents
Culture Documents
Efficacious Distributed Arbitrary Node Duplication Attacks in Wireless Networks
Efficacious Distributed Arbitrary Node Duplication Attacks in Wireless Networks
to
j
via o
1
,o
2
o
3
o
m
. Upon in receipt of l
o
k
, verifies the
signature on the claim, checks for a inconsistency with the
claims previously in its buffer, stores a duplicate of l
in its
safeguard, and then forwards l
to o
k+1.
If any of the nodes
discovers a conflict, i.e., finds another location claiml' for
such that l
l'
-1
s private key
{M}K
-1
s signature on M
SSet of all possible node IDs
1) Solitary Deterministic Cell
In the solitary Deterministic Cell scheme, a
geographic hash function [10] is worn to uniquely and
indiscriminately plot node Ls uniqueness to individual of
the cells in the grid. For example, particular that the
geographic grid consists ofo b cells, a cell at the a'th
row and the b'th column (where o
{1,,o},b
{1,,b}) is uniquely acknowledged as c (where c =
a +b). By using a one-way hash function H ( ), node L is
mapped to a cell D, where =E(I
I
moJ(o.b)] +1 .
The format of the location claim is
[I
I,
l
L
SI0
sk
l
(E(I
L
||l
L
))], where || denotes the
concatenation operation and l
L
is the locality information
of L, which can be articulated using both the two-
dimension or three-dimension coordinate.
every neighbor autonomously decides whether to
promote the claim with a probability p
]
. If a neighbor
tactics to promote the location claim, it initialy desires to
accomplish a geographic hash function [10] to conclude the
destination cell, denoted as D. The location claimis then
forwarded towards cell D. Once the location claim arrives
at cell D, the sensor being paid the claimfirst verifies the
legitimacy of the signature, and then checks whether cell D
is undeniably the cell consequent to the identity scheduled
in the claim message based on the geographic hash
function. If both the verifications thrive, the location claim
is flooded within cell D. Each node in the cell
independently decides whether to accumulate the claim
with a probability p
s
.
=s p
s
Compared to the Line-Selected Multicast algorithms, a
foremost improvement of SDC is that it ensures 100%
success rate for detecting any node replication, as long as
the location claimis fruitfully forwarded towards cell D
and stored by at least individual node in the cell.
In contrast, in the SDC scheme the communication
cost and memory overhead are allied to the numeral of
neighbors that promote a location claim(i.e.,r =J p
]
)
and the numeral of the witnesses (i.e., =s p
s
)
respectively. In addition, the success rate of detecting node
replication is autonomous of when 1. Consequently,
SDC can accomplish inferior communication costs by
setting r to a diminutive rate, and at the equivalent time
guarantee stumpy memory overhead and superior security
(i.e. a high success rate of detecting node replication and
high level of resilience against potential node
compromise), by choosing an appropriate value for (s
and p
s
actually).
Detecting Replicas
Unlike the Line-Selected Multicast algorithms, where
the nodes storing the copies of a location claim be
preferred indiscriminately commencing the intact network,
in SDC such nodes are elected arbitrarily starting a petite
subset of every one of the nodes in the network, i.e., the
nodes in the destination cell resolute by the geographic
hash function. In addition, since the location claimwill be
flooded within the destination cell, the SDC scheme can
constantly distinguish any pair of nodes claiming the
equivalent uniqueness. In other words, p
dr
=100% in SDC,
when r > 0 and > 0.
Resilience against Node Compromise
In SDC, witness nodes are chosen indiscriminately
commencing the nodes of a specified cell instead of the
intact network as in the prior algorithm. Therefore,
pretentious that the adversarys competence of
compromising nodes is inadequate, spontaneously in SDC
the likelihood that an adversary can compromise all the
witness nodes storing the location claim of a prearranged
identity, i.e. p
ts
., is privileged than that of the line selected
Multicast algorithm. Assuming that the adversary has
compromised t nodes in cell D, p
ts
. Can be calculated as
follows:
p
t
s
=
s-w
c
t-w
s
c
t
=
(s-w)!t!
s!.(t-w)!
eq1 where (n
c
r
=
n!
(n-)!!
)
p
t
s
=
(
s-w
t-w
)
(
s
t
)
=
(t-w+1)(t-w+2)..t
(s-w+1)(s-w+2).s
Where t .
2) Parallel Multiple Probabilistic
Cells Like SDC, in the P-MPC system, a geographic
hash function [10] is employed to map node Ls uniqueness
to the target cells. Let c={c1,c2,c3,.c
s:
(i) p
c
=1
=1
(ii)p
c
p
c]
When i >j for i, j {1,2,.,:}
When l broadcasts its location claim, each neighbor
autonomously decides whether to promote the claimin the
similar way as in the SDC scheme. The neighbors that
promote the claimcan conclude the destination cell based
on a geographic hash function and the predetermined
probabilistic distribution of p
c
s . More exclusively, the
neighbors first analyze the deposit of cells (C) to which the
distinctiveness of the sender are mapped, based on a
geographic hash function with the input of I
I
. Then, every
neighbor that forwards the claimautonomously generates a
International J ournal of Computer Trends and Technology- volume3Issue1- 2012
ISSN: 2231-2803 http://www.internationaljournalssrg.org Page 61
arbitrary number z [0, 1). presume that j is the negligible
amount that satisfies < p
c
]
denote the
probability that the location claimof l
1
is forwarded to all
the cells in C except the cells in Ce1, which is an element
of c
s1,b
. Let p
],1
denote the probability that the location
claimof l
2
is forwarded only to all the cells in Ce2. Let
p
],2
denote the probability that the location claimof l
3
is
forwarded to any cell(s) in Ce1 except those in c
c2
. Thus,
we have:
p
3
= p
.p
],1
.p
],2
|c
s2
|
]=1
|c
s1b
|
=1
Resilience against Node Compromise
Let p
ts
SC
(t) and p
ts
P-MPC
(t) denote the functions that
output the pts of the SDC scheme and the P-MPC scheme,
respectively, when the numeral of the compromised nodes
is t. pretentious that the adversarys capability of
compromising nodes is delimited by t , we have t
=1
=
t , wheret
.
Let c
t1
denote the deposit of all the combinations of
choosing 1 to v elements fromC. For any element in c
]1
denoted As c
]1
, the probability that the adversary controls
all the witnesses of a given uniqueness, when such a set of
cells in C (i.e., c
]1
) are selected as the intention cell(s), is
the result of all the individual probabilities p
ts
s of the
cells. Let pi refer to the probability that accurately the cells
in c
]1
are chosen as the destination cells by the r neighbors
that forward the location claim. Let p
ts
P-MPC
(t
]
) refer to the
p
ts
of the j th cell of c
]1
when the numeral of nodes
compromised in this cell is tj . Thus p
ts
P-MPC
(t), can be
calculated as follows:
p
ts
p-MPC
(t) =(p
|c
t1
|
=1
._p
ts
SC
(t
]
))
|c
]1
|
]=1
Note that in Equation (4), |c
t1
| denotes the add up of all the
combinations of choosing 1 to v elements fromC, while
|c
]1
| denotes the numeral cells restricted in a selected
combination, i.e. c
]1
. In additional, p
ts
SC
(t
]
) =1 when
there is no witness in the j
th
cell of c
]1
.
p
ts
P-MPC
(t)=p
c1
.p
ts
SC
(t)
The accomplishment rate that adversaries organize all the
witnesses of a given uniqueness is condensed by a factor of
1-p
c1
.
III. LOCALISED RANDOMISED MULTICAST
To progress the resiliency of the prior multicasts, we
put forward a innovative protocol that randomizes the
witnesses for a known nodes location claim, so that the
adversary cannot anticipate their identities. When a node
announces its location, each of its neighbors sends a replica
of the location claim to a deposit of indiscriminately
chosen witness nodes. If the adversary replicates a node,
then two sets of witnesses will be chosen. In a network of n
nodes, if each location produces n witnesses, then the
birthday paradox predicts at least one collision with lofty
probability, i.e., at least one witness will obtain a couple of
contradictory location claims. The two contradictory
locations claims figure adequate verification to invalidate
the node, so the witness can flood the pair of locations
claims fromside to side the network, and each node can
autonomously prove the revocation verdict.
These protocols presume that each node knows its own
location. We also presume that the network utilizes an
identity-based public key system such that every node is
deployed with a private key, K
-1
, and any other node can
analyze s public key using s ID, i.e., K
=f(). If
essential, we could substitute this classification with a
supplementary traditional PKI in which we assume the
network authorities use a master public/private-key pair
(/(K
M
, K
M
-1
) to sign s public key; however, transmitting
this public-key certificate will have a substantial
communication overhead.
A. Description
At a high level, the protocol has each node transmit its
location claim, along with a signature authenticating the
claim. Each of the nodes neighbors probabilistically
forwards the claimto an arbitrarily chosen set of observer
nodes. If any observer receives two dissimilar location
claims for the similar node ID, it can retract the simulated
node. The birthday paradox makes sure that we notice
International J ournal of Computer Trends and Technology- volume3Issue1- 2012
ISSN: 2231-2803 http://www.internationaljournalssrg.org Page 62
replication with high likelihood using a moderately limited
number of witnesses.
More officially, each node transmit a location claim
to its neighbors,
1
,
2
,
3
,..
d
. The location claimhas the
arrangement (I
,l
,{E(I
,l
)}K
-1
) where
representsl
and l
p.d
E[N
cccc
] =n._1[1
g
n
p.d
]
The Binomial Theorem allows us to approximate
(1x)
y
as (1 xy) for small x, so as long as g n, we have
N
receive
pdg, so over lapping witness locations should not
impact the security of the protocol. As an example, in a
network with n = 10, 000, g = 100, d = 20, and p = 0.1,
perfect coordination would tell 200 nodes, while
independent selection would tell 199. Thus, for the
remainder of the analysis, we will assume that p d g
nodes receive each location claim. Standard derivation of
the birthday paradox, the probability P
nc1
that the p J g
recipients of claiml
1
do not receive any of the p J g
copies of claiml
2
is given by:
p
nc1
=_1
p.J.g
n
]
p.d.g
Similarly, the probability Pnc2 that the p J g recipients
of claims l1 and l2 do not receive any of the p J g
copies of claiml3 is given by
p
nc2
=_1
2.p.J.g
n
]
p.d.g
p
nc
=__1
i.p.J.g
n
]
p.d.g
L-1
=1
The standard deviation that (1+x) <=e
x
p
nc
_c
-t.p
2
.d
2
.g
2
n
L-1
=1
c
-p
2
.d
2
.g
2
n i
L-1
t=1
Thus, if n =10, 000, g =100, d =20, and p =0.05, we will
detect a single replication of _ with probability superior
than 63%, and if _ is replicated twice, we will perceive it
with probability greater than 95%. We engender p.d.g
messages that must be evenly spread throughout the
network. The communication costs are now
0(p.J.g)messages per node.
IV. CONCLUSION
Efficacious distributed arbitrary Multicast approach for
distributed detection of node replication attacks in wireless
sensor networks. Unlike the previous algorithms proposed,
our approach combines deterministic mapping (to reduce
communication and storage costs) with randomization (to
increase the level of resilience to node compromise). Our
International J ournal of Computer Trends and Technology- volume3Issue1- 2012
ISSN: 2231-2803 http://www.internationaljournalssrg.org Page 63
theoretical analysis and empirical results show that,
compared to other approaches, our schemes are more
efficient in large-scale networks, in terms of
communication and memory costs. Moreover, the
probability of replica detection in our approach is higher
than that achieved in these the communication and memory
overheads of our approaches are similar or slightly higher
One of our future work is to simulate the other protocol and
then have a more detailed comparison of efficiency based
on empirical results.
ACKNOWLEDGMENT
We are greatly delighted to place my most profound
appreciation to Er.K.Satyanarayana Chancellor of
K.L.University, Dr.K.Raja Sekhara Rao Principal,
Prof. S.Venkateswaralu Head of the department, and
Dr.Subramanyam in charge for M.Tech under their
guidance and encouragement and kindness in giving us the
opportunity to carry out the paper. Their pleasure nature,
directions, concerns towards us and their readiness to share
ideas enthused us and rejuvenated our efforts towards our
goal. We also thank the anonymous references of this paper
for their valuable comments.
REFRENCES
[1] Bo Zhu , Sushil Jajodia , et,al Localized Multicast: Efficient and
Distributed Replica Detection in Large-Scale Sensor Networks,
IEEE TRANSACTIONS , VOL. 9, NO. 7, J ULY 2010.
[2] B. Zhu, V.G.K. Addada, S. Setia, S. J ajodia, and S. Roy, Efficient
Distributed Detection of Node Replication Attacks in Sensor
Networks, Proc. 23rd Ann. Computer Security Applications Conf.
(ACSAC 07), 2007.
[3] H. Choi, S. Zhu, and T.F. La Porta, SET: Detecting Node Clones in
Sensor Networks, Proc. Third Intl Conf. Security and Privacy in
Comm. Networks (SecureComm) 2007.
[4] M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, A Randomized,
Efficient, and Distributed Protocol for the Detection of Node
Replication Attacks in Wireless Sensor Networks, Proc. ACM
MobiHoc, pp. 80-89, 2007.
[5] Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap:: a secure hop-by-hop
data aggregation protocol for sensor networks In MobiHoc 06:
Proceedings of the seventh ACM international symposiumon Mobile
ad hoc networking and computing, pages 356367, 2006.
[6] Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed detection
of node replication attacks in sensor networks. In Proceedings of
The 2005 IEEE Symposimon Security and Privacy (S&P05), pages
49 63, 2005.
[7] H. Sabbineni and K. Chakrabarty, Location-Aided Flooding: An
Energy-Efficient Data Dissemination Protocol for Wireless Sensor
Networks, IEEE Trans. Computers, vol. 54, no. 1, pp. 36-46, J an.
2005.
[8] J ames Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. The
sybil attack in sensor networks: Analysis & defenses. In Proceedings
of the Third International Symposiumon Information Processing in
Sensor Networks (IPSN 04), pages 259268, 2004.
[9] Arvind Seshadri, Adrian Perrig, Leendert Van Doorn, and Pradeep
Khosla. SWATT: SoftWare-based ATTestation for embedded
devices. In Proceedings of IEEE Symposiumon Security and Privacy
(S&P04), pages 272282, 2004.
[10] David J . Malan, Matt Welsh, and Michael D. Smith. A public-key
infrastructure for key distribution in TinyOS based on elliptic curve
cryptography. In Proceedings of IEEE Conference on Sensor and Ad
Hoc Communications and Networks (SECON), pages 71 80, 2004.