Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers

Research Article

DHT-Based Detection of Node Clone in Wireless Sensor Networks

Download78 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11723-7_16,
        author={Zhijun Li and Guang Gong},
        title={DHT-Based Detection of Node Clone in Wireless Sensor Networks},
        proceedings={Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2012},
        month={7},
        keywords={node clone attack distributed detection wireless sensor networks distributed hash table key-based routing},
        doi={10.1007/978-3-642-11723-7_16}
    }
    
  • Zhijun Li
    Guang Gong
    Year: 2012
    DHT-Based Detection of Node Clone in Wireless Sensor Networks
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-642-11723-7_16
Zhijun Li1,*, Guang Gong1,*
  • 1: University of Waterloo
*Contact email: leezj@engmail.uwaterloo.ca, ggong@calliope.uwaterloo.ca

Abstract

Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left unattended. Several distributed protocols have been proposed for detecting clone. However, some protocols rely on an implicit assumption that every node is aware of all other nodes’ existence; other protocols using an geographic hash table require that nodes know the general network deployment graph. Those assumptions hardly hold for many sensor networks. In this paper, we present a novel node clone detection protocol based on Distributed Hash Table (DHT). DHT provides good distributed properties and our protocol is practical for every kind of sensor networks. We analyze the protocol performance theoretically. Moreover, we implement our protocol in the OMNeT++ simulation framework. The extensive simulation results show that our protocol can detect clone efficiently and holds strong resistance against adversaries.