Research Article
DHT-Based Detection of Node Clone in Wireless Sensor Networks
@INPROCEEDINGS{10.1007/978-3-642-11723-7_16, author={Zhijun Li and Guang Gong}, title={DHT-Based Detection of Node Clone in Wireless Sensor Networks}, proceedings={Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers}, proceedings_a={ADHOCNETS}, year={2012}, month={7}, keywords={node clone attack distributed detection wireless sensor networks distributed hash table key-based routing}, doi={10.1007/978-3-642-11723-7_16} }
- Zhijun Li
Guang Gong
Year: 2012
DHT-Based Detection of Node Clone in Wireless Sensor Networks
ADHOCNETS
Springer
DOI: 10.1007/978-3-642-11723-7_16
Abstract
Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left unattended. Several distributed protocols have been proposed for detecting clone. However, some protocols rely on an implicit assumption that every node is aware of all other nodes’ existence; other protocols using an geographic hash table require that nodes know the general network deployment graph. Those assumptions hardly hold for many sensor networks. In this paper, we present a novel node clone detection protocol based on Distributed Hash Table (DHT). DHT provides good distributed properties and our protocol is practical for every kind of sensor networks. We analyze the protocol performance theoretically. Moreover, we implement our protocol in the OMNeT++ simulation framework. The extensive simulation results show that our protocol can detect clone efficiently and holds strong resistance against adversaries.