{"title":"一种新的基于区域的静态无线传感器网络副本检测路由协议","authors":"N. Usha, E. Anita","doi":"10.1109/ICICES.2017.8070790","DOIUrl":null,"url":null,"abstract":"As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very difficult to detect them in the network. The presence of replicas mainly aims at disrupting the services of the network, thereby decreasing the performance of the same. Many research works have been carried out to detect the replicas in the network, but still each of the mechanisms have some push-backs. This paper mainly analyses the use of a Zone based routing protocol(ZRP) for Clone detection and how effectively routing can be done even in the presence of a clone in the network. Also it discusses how the performance of the network can be maintained even in the presence of the clone in the network.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel zone based routing protocol for detection of replicas in static wireless sensor networks\",\"authors\":\"N. Usha, E. Anita\",\"doi\":\"10.1109/ICICES.2017.8070790\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very difficult to detect them in the network. The presence of replicas mainly aims at disrupting the services of the network, thereby decreasing the performance of the same. Many research works have been carried out to detect the replicas in the network, but still each of the mechanisms have some push-backs. This paper mainly analyses the use of a Zone based routing protocol(ZRP) for Clone detection and how effectively routing can be done even in the presence of a clone in the network. Also it discusses how the performance of the network can be maintained even in the presence of the clone in the network.\",\"PeriodicalId\":134931,\"journal\":{\"name\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2017.8070790\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel zone based routing protocol for detection of replicas in static wireless sensor networks
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very difficult to detect them in the network. The presence of replicas mainly aims at disrupting the services of the network, thereby decreasing the performance of the same. Many research works have been carried out to detect the replicas in the network, but still each of the mechanisms have some push-backs. This paper mainly analyses the use of a Zone based routing protocol(ZRP) for Clone detection and how effectively routing can be done even in the presence of a clone in the network. Also it discusses how the performance of the network can be maintained even in the presence of the clone in the network.