http://iet.metastore.ingenta.com
1887

Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs

Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cognitive Wireless Sensor Networks (CWSNs) provide better bandwidth utilization when compared with normal wireless sensor networks. CWSNs use a technique called opportunistic spectrum access for data transfer. While doing so, however, CWSNs are subject to several security threats. The spectrum sensing data falsification attack comes under the DoS attack. In this attack, a malicious node sends a modified spectrum sensing report so that the resulting collaborative spectrum sensing decision becomes wrong and a good cognitive sensor node receives a wrong decision regarding the vacant spectrum band of other's network. In the presence of the node cloning attack, the solution of the SSDF attack becomes even more difficult. In the node cloning attack, the malicious node creates many clones of the compromised node in the network. In order to confuse the collaborative spectrum sensing system, the clone nodes can send false spectrum sensing reports in a large number. The maximum-match filtering (MMF) algorithm is used for making a secure spectrum sensing decision in CWSNs. The Cloned-Node Detection (CND) algorithm is proposed here to detect cloned nodes. This study also explains how the CND algorithm assists the MMF algorithm to make better spectrum sensing decisions by avoiding the node cloning attack.

References

    1. 1)
      • B.A. Ozgur , O.B. Karli , O. Ergul .
        1. Ozgur, B.A., Karli, O.B., Ergul, O.: ‘Cognitive radio sensor networks’, IEEE Netw., 2009, 23, pp. 3440.
        . IEEE Netw. , 34 - 40
    2. 2)
      • J. Sen . (2013)
        2. Sen, J.: ‘Security and privacy challenges in cognitive wireless sensor Networks’ (IGI Global, Hershey, Pennsylvania, USA, 2013), pp. 136.
        .
    3. 3)
      • W. Chen , Y. Niu , Y. Zou .
        3. Chen, W., Niu, Y., Zou, Y.: ‘Congestion control and energy-balanced scheme based on the hierarchy for WSNs’, IET Wirel. Sens. Syst., 2017, 7, (1), pp. 18.
        . IET Wirel. Sens. Syst. , 1 , 1 - 8
    4. 4)
      • S. Haykin .
        4. Haykin, S.: ‘Cognitive radio: brain-empowered wireless communications’, IEEE J. Sel. Areas Commun., 2005, 23, pp. 201220.
        . IEEE J. Sel. Areas Commun. , 201 - 220
    5. 5)
      • P.S. Chatterjee , M. Roy .
        5. Chatterjee, P.S., Roy, M.: ‘Base station controlled spectrum allocation technique to detect the PUE attack in CWSN’, Comput. Intell. Data Min., 2015, 1, pp. 689698.
        . Comput. Intell. Data Min. , 689 - 698
    6. 6)
      • R. Chen , J.M. Park .
        6. Chen, R., Park, J.M.: ‘Ensuring trustworthy spectrum sensing in cognitive radio networks’. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR'06), 2006, pp. 110119.
        . 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR'06) , 110 - 119
    7. 7)
      • (2003)
        7. Federal Communication Commission: ‘Notice for proposed rule making (NPRM 03-22), facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies’, 2003.
        .
    8. 8)
      • S. Arkoulis , L. Kazatzopoulos , C. Delakouridis .
        8. Arkoulis, S., Kazatzopoulos, L., Delakouridis, C., et al: ‘Cognitive spectrum and its security issues’. 2nd Int. Conf. Next Generation Mobile Applications, Services and Technologies (NGMAST), 2008, pp. 565570.
        . 2nd Int. Conf. Next Generation Mobile Applications, Services and Technologies (NGMAST) , 565 - 570
    9. 9)
      • R. Chen , J.M. Park , K. Bian .
        9. Chen, R., Park, J.M., Bian, K.: ‘Robust distributed spectrum sensing in cognitive radio networks’. IEEE Conf. Computer Communications (Infocom), 2008, pp. 3135.
        . IEEE Conf. Computer Communications (Infocom) , 31 - 35
    10. 10)
      • T.X. Brown , A. Sethi .
        10. Brown, T.X., Sethi, A.: ‘Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment’. 2nd Int. Conf. Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), 2007.
        . 2nd Int. Conf. Cognitive Radio Oriented Wireless Networks and Communications (CrownCom)
    11. 11)
      • A. Araujo , J. Blesa , E. Romero .
        11. Araujo, A., Blesa, J., Romero, E., et al: ‘Security in cognitive wireless sensor networks. Challenges and open problems’, EURASIP J. Wirel. Commun. Netw., 2012, 48, pp. 18.
        . EURASIP J. Wirel. Commun. Netw. , 1 - 8
    12. 12)
      • P.S. Chatterjee , M. Roy .
        12. Chatterjee, P.S., Roy, M.: ‘A regression based spectrum-sensing data-falsification attack detection technique in CWSN’. 14th Int. Conf. Information Technology, 2015, pp. 4853.
        . 14th Int. Conf. Information Technology , 48 - 53
    13. 13)
      • J. Newsome , E. Shi , D. Song .
        13. Newsome, J., Shi, E., Song, D., et al: ‘The sybil attack in sensor networks: analysis and defenses’, Research Showcase at CMU, the Carnegie Institute of Technology, IPSN'04, ACM, 2004, 4, pp. 259268.
        . IPSN'04, ACM , 259 - 268
    14. 14)
      • W.Z. Khan , Y.A. Mohammed , Y. Xiang .
        14. Khan, W.Z., Mohammed, Y.A., Xiang, Y.: ‘Detection and mitigation of node replication attacks in wireless sensor networks: a survey’, Int. J. Distrib. Sensor Netw., 2013, pp. 122.
        . Int. J. Distrib. Sensor Netw. , 1 - 22
    15. 15)
      • Y. Lou , Y. Zhang , S. Liu .
        15. Lou, Y., Zhang, Y., Liu, S.: ‘Single Hop detection of node clone attacks in mobile wireless sensor networks’. Int. Workshop on Information and Electronics Engineering (IWIEE), 2012, pp. 27982803.
        . Int. Workshop on Information and Electronics Engineering (IWIEE) , 2798 - 2803
    16. 16)
      • B. Fan , D.G. Andersen , M Kaminsky .
        16. Fan, B., Andersen, D.G., Kaminsky, M, et al: ‘Cuckoo filter: practically better than bloom’. 10th ACM Int. Conf.n Emerging Networking Experiments and Technologies, 2014, pp. 7588.
        . 10th ACM Int. Conf.n Emerging Networking Experiments and Technologies , 75 - 88
    17. 17)
      • W.R. Heinzelman , A. Chandrakasan , H. Balakrishnan .
        17. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: ‘Energy-efficient communication protocol for wireless microsensor networks’. Hawaii Int. Conf. System Sciences, 2000, pp. 110.
        . Hawaii Int. Conf. System Sciences , 1 - 10
    18. 18)
      • B. Parno , A. Perrig , V. Gligor .
        18. Parno, B., Perrig, A., Gligor, V.: ‘Distributed detection of node replication attacks in sensor networks’. IEEE Symp. Security and Privacy, 2005, pp. 4963.
        . IEEE Symp. Security and Privacy , 49 - 63
    19. 19)
      • M. Conti , D.R. Pietro , L.V. Mancini .
        19. Conti, M., Pietro, D.R., Mancini, L.V., et al: ‘A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks’. 8th ACM Int. Symp. Mobile Ad hoc Networking and Computing (MobiHoc ‘07), 2007, pp. 8089.
        . 8th ACM Int. Symp. Mobile Ad hoc Networking and Computing (MobiHoc ‘07) , 80 - 89
    20. 20)
      • M. Zhang , K. Vishal , C. Shigang .
        20. Zhang, M., Vishal, K., Shigang, C., et al: ‘Memory efficient protocols for detecting node replication attacks in wireless sensor networks’. 16th IEEE Int. Conf. Network Protocols (ICNP'09), 2009, pp. 284293.
        . 16th IEEE Int. Conf. Network Protocols (ICNP'09) , 284 - 293
    21. 21)
      • H. Chan , A. Perrig , D.X. Song .
        21. Chan, H., Perrig, A., Song, D.X.: ‘Random key predistribution schemes for sensor networks’. IEEE Symp. Security and Privacy, IEEE Computer Society, 2003, pp. 197213.
        . IEEE Symp. Security and Privacy, IEEE Computer Society , 197 - 213
    22. 22)
      • C.M. Yu , C.S. Lu , S.Y. Kuo .
        22. Yu, C.M., Lu, C.S., Kuo, S.Y.: ‘CSI: compressed sensing based clone identification in sensor networks’. IEEE Int. Conf. Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012.
        . IEEE Int. Conf. Pervasive Computing and Communications Workshops (PERCOM Workshops)
    23. 23)
      • S.H. Chowdhury , B. Grebur , L. Xiao .
        23. Chowdhury, S.H., Grebur, B., Xiao, L.: ‘Defence against spectrum sensing data falsification attacks in cognitive radio networks’. Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunication Engineering, 2012, pp. 154171.
        . Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunication Engineering , 154 - 171
    24. 24)
      • P. Kaligineedi , M. Khabbazian , V.K. Bhargava .
        24. Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: ‘Malicious user detection in a cognitive radio cooperative sensing system’, IEEE Trans. Wirel. Commun., 2010, 9, pp. 24882497.
        . IEEE Trans. Wirel. Commun. , 2488 - 2497
    25. 25)
      • H. Li , Z. Han .
        25. Li, H., Han, Z.: ‘Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks’, IEEE Trans. Wirel. Commun., 2010, pp. 35543565.
        . IEEE Trans. Wirel. Commun. , 3554 - 3565
    26. 26)
      • C. Chen , M. Song , C. Xin .
        26. Chen, C., Song, M., Xin, C., et al: ‘A robust malicious user detection scheme in cooperative spectrum sensing’. IEEE Global Telecommun. Conf., 2012.
        . IEEE Global Telecommun. Conf.
    27. 27)
      • J. Neter , M.H. Kutner , C.J. Nachtsheim .
        27. Neter, J., Kutner, M.H., Nachtsheim, C.J., et al: ‘Applied linear statistical models’ (McGraw-Hill, Irwin, 5th edn.).
        .
    28. 28)
      • M. Mitzenmacher .
        28. Mitzenmacher, M.: ‘Compressed bloom filters’. 20th Annual ACM Symp. Principles of Distributed Computing, 2001, pp. 144150.
        . 20th Annual ACM Symp. Principles of Distributed Computing , 144 - 150
    29. 29)
      • A. Araujo , E. Romero , J. Blesa .
        29. Araujo, A., Romero, E., Blesa, J., et al: ‘Cognitive wireless sensor networks framework for green communications design’. Second Int. Conf. Advances in Cognitive Radio, 2012, pp. 3440.
        . Second Int. Conf. Advances in Cognitive Radio , 34 - 40
    30. 30)
      • A. Ray , D. De .
        30. Ray, A., De, D.: ‘Energy efficient clustering protocol based on K-means (EECPK-means)-midpoint algorithm for enhanced network lifetime in wireless sensor network’, IET Wirel. Sens. Syst., 2016, 6, pp. 181191.
        . IET Wirel. Sens. Syst. , 181 - 191
    31. 31)
      • A. Rastegarnia , V. Solouk .
        31. Rastegarnia, A., Solouk, V.: ‘Performance evaluation of castalia wireless sensor network simulator’. 34th Int. Conf. Telecommunications and Signal Processing (TSP), 2011.
        . 34th Int. Conf. Telecommunications and Signal Processing (TSP)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2016.0065
Loading

Related content

content/journals/10.1049/iet-wss.2016.0065
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address