Next Article in Journal
In-Situ LED-Based Observation of Snow Surface and Depth Transects
Previous Article in Journal
A New Construction of High Performance LDPC Matrices for Mobile Networks
 
 
Article

Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)

1
Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, Selangor 43400, Malaysia
2
School of Engineering and Information Technology, University of Technology Sydney, Sydney 2007, Australia
3
School of Information Technology, FoBIS, UCSI University, Kula Lumpur 56000, Malaysia
*
Authors to whom correspondence should be addressed.
Sensors 2020, 20(8), 2283; https://doi.org/10.3390/s20082283
Received: 10 January 2020 / Revised: 30 January 2020 / Accepted: 6 February 2020 / Published: 17 April 2020
(This article belongs to the Section Sensor Networks)
Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes’ important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead. View Full-Text
Keywords: mobile wireless sensor network; hybrid; node replication attack; danger theory; danger zone; wireless sensor network mobile wireless sensor network; hybrid; node replication attack; danger theory; danger zone; wireless sensor network
Show Figures

Figure 1

MDPI and ACS Style

Shaukat, H.R.; Hashim, F.; Shaukat, M.A.; Ali Alezabi, K. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Sensors 2020, 20, 2283. https://doi.org/10.3390/s20082283

AMA Style

Shaukat HR, Hashim F, Shaukat MA, Ali Alezabi K. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Sensors. 2020; 20(8):2283. https://doi.org/10.3390/s20082283

Chicago/Turabian Style

Shaukat, Haafizah Rameeza, Fazirulhisyam Hashim, Muhammad Arslan Shaukat, and Kamal Ali Alezabi. 2020. "Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)" Sensors 20, no. 8: 2283. https://doi.org/10.3390/s20082283

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop