Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Communication Against Framing Attack in Wireless Sensor Network

(*) Corresponding author

Authors' affiliations



In Wireless sensor networks (WSNs) detecting clone nodes is a major challenge.  Distributed Hash Table (DHT) is one of the protocols which efficiently detect the clone nodes. The detected clone information is to be disseminated to the other nodes (witness nodes) in the network. The malicious nodes in-between can frame innocent nodes as clone nodes and clone nods as innocent nodes. This is referred to as framing attack. Our objective is to overcome this by using a key management scheme called Differentiated Pre Key Distribution to in order to ensure secure communication between the nodes in a Zone based WSN. In this scheme different number of keys is distributed to different sensors to enhance the resilience of certain links which is exploited during routing where nodes route the clone information through the links which are more resilient. The performance evaluation shows that this scheme provides secure communication in disseminating the detected information between the nodes in the network.
Copyright © 2015 Praise Worthy Prize - All rights reserved.


Distributed Hash Table (DHT); Framing Attack; Key Management; Security; Wireless Sensor Networks (WSN)

Full Text:



H. Choi, S. Zhu ,T.F. La porta, SET: Detecting node clones in sensor networks , Security and privacy in communications networks and the workshops, Secure comm., pp.341-350, 2007.

K. Cho, M. Jo, T. Kwon, Chen, H-H. Fellow, Hoon Lee, Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks, IEEE System journal , Vol. 7, No. 1, 2013.

B. Parno, A. Perring, V. Gligor, Distributed detection of node replication attacks in Sensor Networks, in proc. IEEE Symp. Security Privacy, pp.49-63, 2005.

R. Brooks, P.Y. Govindaraju, M. Pirretti, N. Vijay Krishna,M.T. , On the Detection of Clones in Sensor Networks Using Random Key Predistribution, IEEE Transaction on System, Man and Cybernetics, Part C, Vol. 37, No. 6, 2007.

Z. Li ,G. Gong, Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , Mobile Adhoc and sensor systems, pp.1030-1035, 2009.

M. Conti, R. Di, Pietro, L. Vincenzo Mancini, A. Mei, Distributed Detection of Clone Attacks in Wireless Sensor Networks, IEEE Trans. on Dependable and secure computing, Vol. 8, No. 5, 2011.

Y. Zeng, J. Cao, S. Zhang, S. Guo , L. Xie, Random-walk Based Approach to Detect Clone Attacks in wireless sensor networks, IEEE Journal on selected areas in Communications, Vol. 28, No. 5, 2010.

C-M. Yu, Y-T. Tsou, C-S. Lu , S-Y. Kuo, Localized Algorithm for Detection of Node Replication Attacks in Mobile Sensor Networks, IEEE Transaction on Information forensics and security, Vol. 8, No. 5,2013.

J-W. Ho, M. Wright, S-H. Das, Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing, IEEE Transaction on Mobile Computing, Vol.10, No.6, 2011.

Zhijun Li , Guang Gong ,On the Node Clone Detection in Wireless Sensor Networks, IEEE Transactions on Networking, Volume:21 , Issue: 6, 2013

W. Gu, N. Dutta, S. Chellappan and X.Bai, Providing End to End Secure Communications in Wireless Sensor Networks, IEEE Transaction on Network and service management,Vol.8,No.3 ,2011.

E.A.Mary Anita, R.Geetha and E.Kannan , A Novel hybrid keymanagement scheme for establishing secure communication in wireless sensor networks, Wireless personal communication springer, published online January 2015.

L. Eschenauer ,V. D. Gligor, A key-management scheme for distributed sensor networks, in Proc.9th ACM Conf. Comput. Commun.Security , 2002.

H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Proc. IEEE Symp. Research Security Privacy, 2003.

P. Traynor, H. Choi, G. Cao, S. Zhu, T. L. Porta, Establishing pair-wise keys in heterogeneous sensor networks, in Proc. 25th IEEE Conf. Comput. Commun., 2006.

A. Poornima , B. Amberker, Tree-based key management scheme for heterogeneous sensor networks,in 16th IEEE International Conf. Netw., 2008.

Y. Yang, J. Zhou, R. Deng,F. Bao, Hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Security Privacy Commun. Netw., pp. 285-295, 2009.

B. Tian, S. Han, and T. Dillon, A key management scheme for heterogeneous sensor networks using keyed-hash chain, in 5th International Conf. Mobile Ad-hoc Sensor Netw., 2010.

J. Kim, J. Lee, K. Rim, Energy efficient key management protocol in wireless sensor networks, International J. Security its Appl., 2010.

M. Wen, Z. Yin, Y. Long, Y. Wang, An adaptive key management framework for the wireless mesh and sensor networks, Wireless Sensor Netw. J., 2010.

H. Jen-Yan, I. Liao, H. Tang, A forward authentication key management scheme for heterogeneous sensor networks, EURASIP J.Wireless Commun. Netw., 2010.

Alla, S.B., Ezzati, A., A QoS-guaranteed coverage and connectivity preservation routing protocol for heterogeneous wireless sensor networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.

Eroglu, A., Design of wireless data acquisition sensor system for health care applications, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 386-391.

Shankar, T., Shanmugavel, S., Karthikeyan, A., Modified harmony search algorithm for energy optimization in WSN, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 214-220.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize