Home / Regular Issue / JTAS Vol. 25 (S) Apr. 2017 / JST-S0222-2016

 

An Analysis on Node Cloning Attacks Prevention Using Unique Hardware Identity in WSN

Norhaflyza Marbukhari, Yusnani Mohd Yussoff, Murizah Kassim, Mohd Anuar Mat Isa and Habibah Hashim

Pertanika Journal of Tropical Agricultural Science, Volume 25, Issue S, April 2017

Keywords: Node cloning, node impersonation, security, Unique Hardware Identity, Wireless Sensor Network

Published on: 21 Dec 2017

This paper presents a study on node impersonation attack in Wireless Sensor Networks (WSN) environment. Node cloning is a major attack among sensor where the leak of node identity is easy to clone if it is not secured. For this purpose, an analysis that explores techniques to prevent node cloning attack was done using a unique node identity. An algorithm to generate the unique identity was developed on high performance ARM hardware and programmed the data authentication together with sensor nodes. Communication among the sensor nodes and base station depends on a successful authentication using the unique identity (UID). The sensor nodes are resistant against node cloning attack when the UID identity is unequal. Results present successful generation of the UID, while execution time between two nodes is faster and low power consumption is used on the technique. The analysis has proven that the unique UID is secured by the developed node identity algorithms and against cloning attack. This outcome is significant for new development of secured WSN sensor hardware, which can be implemented in new network technology.

ISSN 1511-3701

e-ISSN 2231-8542

Article ID

JST-S0222-2016

Download Full Article PDF

Share this article

Recent Articles