MadCD: A mobile agent based distributed clone detection method in mobile WSNs

In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 7, JULY 2014, 225–231 Available online at: ISSN 2308-9830 N C S MadCD: A Mobile Agent Based Distributed Clone Detection Method in Mobile WSNs SEPIDE MORADI1 and MINA ZOLFY LIGHVAN2 1, 2 Department of Electrical and Computer Engineering, Tabriz University, Tabriz, Iran E-mail: 2mzolfy@ ABSTRACT Sensor nodes used in enemy environments are disposed to capture and Compromise. An adversary may obtain secret information from sensors, such attack is named as clone attack. The clone attack, Replicate nodes and arrange them in the network to launch a variety of other attacks. In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of researchists use mobile agents as a novel template for distributed purpose to dominate the limitations of sensor nodes. Recently, several solutions are proposed to tackle clone attacks, but they mostly suffer from high overhead. In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead. Keywords: Wireless sensor networks, Clone attack, Clone detection, Mobile agent, location. 1 INTRODUCTION Wireless sensor networks are gradually becomes a proper solution for a wide area of real world monitoring problems. These networks are typically organized in uncontrollable and usually not reliable environments. Almost all sensor networks are physically reachable and thus more vulnerable. An attacker may capture and compromise a node and control a valid member of the network. The clone attack is the basis of a range of

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.