IJSRSET1625111 | Received : 21 October 2016 | Accepted : 31 October 2016 | September-October-2016 [(2)5: 481-486]
© 2016 IJSRSET | Volume 2 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099
Themed Section: Engineering and Technology
481
An Efficient Cloning Detection Protocol Using Distributed
Hash Table for Cyber-Physical System in WSN
K. Sindhukavi*
1
, P. Brundha
2
, P. J. Beslin Pajila
3
*1
PG Student, CSE, Anna University, Tirunelveli, Tamil Nadu, India
2,3
CSE, Anna University, Tirunelveli, Tamil Nadu, India
ABSTRACT
Wireless Sensor Networks consists of sensors which are distributed in an ad hoc manner. Various security
mechanisms such as cryptography, authentication, confidentiality, and message integrity, have been proposed to
avoid security threats such as message replay, and fabrication of messages. The existing system uses distributed
Low-Storage Clone Detection protocol (LSCD) for WSNs. This protocol designs a detection route along the
perpendicular direction of a known path with known nodes deployed in a ring path. However, in this a powerful
adversary can also replicate node IDs, which leads to the need for improved clone detection. In order to overcome
this, distributed hash table (DHT) based clone detection protocol is proposed that provides a checking system is
constructed to catch cloned nodes. The protocol’s completion on memory consumption and a critical security metric
are theoretically deduced through a probability model. The DHT-based protocol can catch node clone with the high-
security level and holds strong resistance against adversary’s attacks.
Keywords: Wireless Sensor Network Security, Clone Detection Protocol, Distributed Hash Table
I. INTRODUCTION
Wireless sensor network is one of the most important
compositions of cyber-physical systems. Secure
communication in WSN is vital because information
transferred through such networks can be easily
replaced. For instance, an adversary could capture
sensor nodes and acquire all the information stored.
Therefore, an adversary may replicate captured nodes
and deploy them in the network to perform a variety of
malicious activities. This type of attack is referred to as
a cloned attack. Witness-based clone detection methods
that allow resource-constrained sensor nodes to
mitigate node capture and clone attacks have been
developed. In such methods, each node forwards its
identity to a set of coordinates that act as a witness
node. Such methods use that fact that clone has the
same ID as a captured node but are at different
locations. Hence clone is detected when two nodes
report same ID but different locations. A cloned node,
because it has legitimate information, may participate
in network operations in the same manner as a non-
compromised node, and thus, the cloned node can
launch a variety of attacks.
In the LSCD protocol, witness nodes form route paths
along circles, with a sink serving as the center, because
clone detection is processed along the centrifugal (or
centripetal) direction, and the distance between any two
detection routes is shorter than the witness path length.
Thus, the witness path must encounter the detection
route, ensuring that the LSCD theoretically has a 100%
clone detection probability. Moreover, witness routes
and clone detection routes are randomly generated.
Thus, even if the adversary knows the LSCD
algorithm, the locations of witness nodes and detection
route information cannot be obtained. Therefore, the
LSCD protocol has fully distributed characteristics and
strong robustness to compromise attacks.
To overcome the problem occurred in the Low Storage
Clone Detection Protocol new technique called
Distributed hash table (DHT) is introduced DHT is a
class of a dissolution distributed system that provides a