IJSRSET1625111 | Received : 21 October 2016 | Accepted : 31 October 2016 | September-October-2016 [(2)5: 481-486] © 2016 IJSRSET | Volume 2 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Themed Section: Engineering and Technology 481 An Efficient Cloning Detection Protocol Using Distributed Hash Table for Cyber-Physical System in WSN K. Sindhukavi* 1 , P. Brundha 2 , P. J. Beslin Pajila 3 *1 PG Student, CSE, Anna University, Tirunelveli, Tamil Nadu, India 2,3 CSE, Anna University, Tirunelveli, Tamil Nadu, India ABSTRACT Wireless Sensor Networks consists of sensors which are distributed in an ad hoc manner. Various security mechanisms such as cryptography, authentication, confidentiality, and message integrity, have been proposed to avoid security threats such as message replay, and fabrication of messages. The existing system uses distributed Low-Storage Clone Detection protocol (LSCD) for WSNs. This protocol designs a detection route along the perpendicular direction of a known path with known nodes deployed in a ring path. However, in this a powerful adversary can also replicate node IDs, which leads to the need for improved clone detection. In order to overcome this, distributed hash table (DHT) based clone detection protocol is proposed that provides a checking system is constructed to catch cloned nodes. The protocol’s completion on memory consumption and a critical security metric are theoretically deduced through a probability model. The DHT-based protocol can catch node clone with the high- security level and holds strong resistance against adversary’s attacks. Keywords: Wireless Sensor Network Security, Clone Detection Protocol, Distributed Hash Table I. INTRODUCTION Wireless sensor network is one of the most important compositions of cyber-physical systems. Secure communication in WSN is vital because information transferred through such networks can be easily replaced. For instance, an adversary could capture sensor nodes and acquire all the information stored. Therefore, an adversary may replicate captured nodes and deploy them in the network to perform a variety of malicious activities. This type of attack is referred to as a cloned attack. Witness-based clone detection methods that allow resource-constrained sensor nodes to mitigate node capture and clone attacks have been developed. In such methods, each node forwards its identity to a set of coordinates that act as a witness node. Such methods use that fact that clone has the same ID as a captured node but are at different locations. Hence clone is detected when two nodes report same ID but different locations. A cloned node, because it has legitimate information, may participate in network operations in the same manner as a non- compromised node, and thus, the cloned node can launch a variety of attacks. In the LSCD protocol, witness nodes form route paths along circles, with a sink serving as the center, because clone detection is processed along the centrifugal (or centripetal) direction, and the distance between any two detection routes is shorter than the witness path length. Thus, the witness path must encounter the detection route, ensuring that the LSCD theoretically has a 100% clone detection probability. Moreover, witness routes and clone detection routes are randomly generated. Thus, even if the adversary knows the LSCD algorithm, the locations of witness nodes and detection route information cannot be obtained. Therefore, the LSCD protocol has fully distributed characteristics and strong robustness to compromise attacks. To overcome the problem occurred in the Low Storage Clone Detection Protocol new technique called Distributed hash table (DHT) is introduced DHT is a class of a dissolution distributed system that provides a