Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/252063
Title: Prevention of Node Clone Attack Secure and Energy Efficient Algorithms in WSN
Researcher: Mohindru, Vandana
Guide(s): Singh, Yashwant and Bhatt, Ravindara
Keywords: Engineering and Technology,Computer Science,Computer Science Interdisciplinary Applications
Hybrid Cryptography
Message Authentication
Node Clone Attack
Re-authentication
Wireless sensor networks
University: Jaypee University of Information Technology, Solan
Completed Date: 2019
Abstract: Wireless Sensor Networks (WSNs) are emerging as a commendable choice for monitoring and surveillance application. WSNs are a promising candidate in healthcare, agriculture, and military areas. The reason for the growing popularity of sensor networks is the lightweight sensor nodes. These small sized cost-effective nodes are battery constrained devices with limited computation power and work within short range using wireless communication. These sensor nodes are spatially dispersed in a hostile environment where there is no involvement of human being. The primary motive of these sensor nodes is to sense the physical occurrences in the region-of-interest and perform processing after that transfers the sensed data to the base station. In WSNs, multi-hop communication is preferred for a scalable network. Further, sensor nodes are resource constraints regarding power, computation energy, communication energy, and storage space. The sensor nodes in WSNs are easily approachable by various attackers because sensor nodes are unattended in the hostile environment. An attacker can easily capture sensor nodes, altering information that is being communicated and reduce the capability of the sensor networks to perform its tasks. There are numerous security attacks in the network including clone attacks, Sybil attack, sinkhole attack, traffic analysis attack, wormhole attack, replay attack, black hole attack, and Denial of Service (DDoS) attack. All these attacks have different goals and consequences. Further, these attacks work at different levels during the network lifetime. Out of these security attacks, node clone attack is the most dangerous attacks. In this thesis, we have considered the node clone attack and have proposed the algorithms that secure sensor networks from the node clone attack. In this attack, the attacker compromises the sensor node which is placed in an unattended environment and extracts sensor node secret information like keys and node identification details. newlineSoon after, the attacker starts cloning th
Pagination: xvii, 195p.
URI: http://hdl.handle.net/10603/252063
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File52.52 kBAdobe PDFView/Open
02_certificate;declaration;acknowledgement.pdf313.14 kBAdobe PDFView/Open
03_table of contents;list of tables & figures.pdf123.03 kBAdobe PDFView/Open
04_abstract.pdf44.45 kBAdobe PDFView/Open
05_chapter 1.pdf192.4 kBAdobe PDFView/Open
06_chapter 2.pdf3.67 MBAdobe PDFView/Open
07_chapter 3.pdf1.17 MBAdobe PDFView/Open
08_chapter 4.pdf2.01 MBAdobe PDFView/Open
09_chapter 5.pdf1.74 MBAdobe PDFView/Open
10_chapter 6.pdf818.65 kBAdobe PDFView/Open
11_chapter 7.pdf65.97 kBAdobe PDFView/Open
12_references.pdf944.74 kBAdobe PDFView/Open
13_appendix a.pdf278.85 kBAdobe PDFView/Open
14_appendix b.pdf276.75 kBAdobe PDFView/Open
15_appendix c.pdf14.3 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: