Archives

An Efficient Intrusion Detection and Authentication Mechanism for Detecting Clone Attack in Wireless Sensor Networks


P. Sherubha and N. Mohanasundaram
Abstract

Wireless sensor networks are deployed in unfavourable conditions where attackers physically detain certain active nodes. Initially an attacker reconstructs the network topology, by replicating them into a huge amount of clones, and easily captures network control. WSNs are crucial for seeking network protection. Various sorts of attacks have been investigated in WSN by researchers. Clone attack is an immensely harmful attack against sensor network where huge genuine replicas are utilized for illegal entry into network. Discriminating Clone attack (CA) causes internal attacks such as, Sybil attack, sinkhole and wormhole attack, whilst multicasting is an exceptional job in WSN. Existing technique like Randomised, Efficient and Distributed (RED), MVP and PVM possess a scheme of self-healing methodology, which verifies node identities by examining its neighbourhood and provides effectual authentication mechanism. Therefore, an Efficient Anti-clone Intrusion Detection Scheme [EAC-IDS] is proposed in this work to guarantee authentication and encounter the clone in the original network links, along with false alarm condition. The proposed method was examined in diverse scenarios to verify its performance. In addition, the proposed EAC-IDS shows better trade off with respect to false alarm and authentication mechanism in contrast to the existing methods.

Volume 11 | Issue 5

Pages: 55-68