DDPM is compared with extremely efficient detection
(XED). The simulation results indicate that the aver-
age number of witness for the DDPM protocol is 7%-
10% higher than that for XED. The reason for this is
that in XED, only neighbors are responsible to check
whether any node has been cloned or not whereas in
DDPM, the neighbors, the intermediate nodes based
on prefix and the destination node all serve as witness.
Furthermore this set of nodes varies for each round of
detection and is not predetermined. This exhibits the
superiority of the DDPM.
5 CONCLUSION
In this paper, we introduced a distributed approach
for clone detection in mobile sensor networks. We
aimed to solve the problem of avoiding picking a de-
terministic set of nodes that existing approaches suf-
fer from. Our initial simulations show that DDPM can
outperform existing state-of-art approached like XED
with by providing a higher security level. DDPM also
reduces the communication overhead. DDPM is ID-
oblivious as well as area oblivious. For our future
work, we will measure the performance by incorpo-
rating several independent DDPM systems with dif-
ferent random numbers and vary the network density
to check performance in the case of sparse mobile
sensor network.
REFERENCES
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and
Cayirci, E. (2002). A survey on sensor networks.
IEEE communications magazine, 40(8):102–114.
Bonaci, T., Bushnell, L., and Poovendran, R. (2010). Node
capture attacks in wireless sensor networks: a system
theoretic approach. In 49th IEEE Conference on De-
cision and Control (CDC), pages 6765–6772. IEEE.
Brooks, R., Govindaraju, P., Pirretti, M., Vijaykrishnan,
N., and Kandemir, M. T. (2007). On the detection
of clones in sensor networks using random key pre-
distribution. IEEE Transactions on Systems, Man,
and Cybernetics, Part C (Applications and Reviews),
37(6):1246–1258.
Choi, H., Zhu, S., and La Porta, T. F. (2007). Set: Detect-
ing node clones in sensor networks. In Security and
Privacy in Communications Networks and the Work-
shops, 2007. SecureComm 2007. Third International
Conference on, pages 341–350. IEEE.
Conti, M., Di Pietro, R., Mancini, L., and Mei, A. (2011).
Distributed detection of clone attacks in wireless sen-
sor networks. IEEE Transactions on Dependable and
secure computing, 8(5):685–698.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In Proceedings of the 9th ACM conference on Com-
puter and communications security, pages 41–47.
ACM.
Ho, J. W., Wright, M., and Das, S. K. (2009). Fast detec-
tion of replica node attacks in mobile sensor networks
using sequential analysis. In INFOCOM 2009, IEEE,
pages 1773–1781. IEEE.
Johnson, D. B. and Maltz, D. A. (1996). Dynamic source
routing in ad hoc wireless networks. In Mobile com-
puting, pages 153–181. Springer.
Khan, W. Z., Aalsalem, M. Y., and Saad, N. (2015). Dis-
tributed clone detection in static wireless sensor net-
works: Random walk with network division. PLoS
One, 10(5).
Liu, A. and Ning, P. (2008). Tinyecc: A configurable library
for elliptic curve cryptography in wireless sensor net-
works. In Information Processing in Sensor Networks,
2008. IPSN’08. International Conference on, pages
245–256. IEEE.
Malan, D. J., Welsh, M., and Smith, M. D. (2008). Im-
plementing public-key infrastructure for sensor net-
works. ACM Transactions on Sensor Networks
(TOSN), 4(4):22.
OpenSim (2016). Omnet++.
Parno, B., Perrig, A., and Gligor, V. (2005). Distributed de-
tection of node replication attacks in sensor networks.
In 2005 IEEE Symposium on Security and Privacy
(S&P’05), pages 49–63. IEEE.
Yi, J., Koo, J., and Cha, H. (2008). A localization technique
for mobile sensor networks using archived anchor in-
formation. In 2008 5th Annual IEEE Communica-
tions Society Conference on Sensor, Mesh and Ad Hoc
Communications and Networks, pages 64–72. IEEE.
Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2008). Mobile sensor
network resilient against node replication attacks. In
2008 5th Annual IEEE Communications Society Con-
ference on Sensor, Mesh and Ad Hoc Communications
and Networks, pages 597–599. IEEE.
Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2009). Efficient and
distributed detection of node replication attacks in mo-
bile sensor networks. In Vehicular Technology Con-
ference Fall (VTC 2009-Fall), 2009 IEEE 70th, pages
1–5. IEEE.
Yu, C.-M., Tsou, Y.-T., Lu, C.-S., and Kuo, S.-Y. (2013).
Localized algorithms for detection of node replication
attacks in mobile sensor networks. IEEE transactions
on information forensics and security, 8(5):754–768.
Zhou, L., Ni, J., and Ravishankar, C. V. (2006). Supporting
secure communication and data collection in mobile
sensor networks. In INFOCOM.
Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., and Roy, S.
(2007). Efficient distributed detection of node replica-
tion attacks in sensor networks. In Computer Security
Applications Conference, 2007. ACSAC 2007. Twenty-
Third Annual, pages 257–267. IEEE.
Distributed Clone Detection in Mobile Sensor Networks
141