TY - JOUR T1 - A Novel Distributed and Secured IRED Protocol for Detecting Node Replication Attack in Wireless Sensor Network AU - Uma Maheswari, P. AU - Ganesh Kumar, P. JO - Asian Journal of Information Technology VL - 12 IS - 9 SP - 297 EP - 304 PY - 2013 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2013.297.304 UR - https://makhillpublications.co/view-article.php?doi=ajit.2013.297.304 KW - WSN security KW -node replication KW -clone detection KW -efficiency KW -distributed protocol KW -secure IRED AB - Nodes of Wireless Sensor Network (WSN) are often deployed in the antagonistic environment and many nodes are unattended. Due to this nature, nodes are easily tracked by the adversary to initiate clone attack. The clone attack is taken through obtaining the credentials of a node in the WSN. They capture and compromise the node and make replicas of them to launch various attacks through the replicated nodes. The cloned nodes are referred as the clones. The clone attack acts as the basic method to mount a huge insider attack. Therefore, it becomes necessary to detect the cloned nodes that are introduced by the adversary in a sensor network. Many techniques and protocols have been proposed to identify the replicated nodes that are presented in the literature review section. Nevertheless they do not meet the requirements in detecting the attack. To address this issue, researchers of this study have proposed a protocol named Intensified Randomized Efficient Distributed (IRED). The proposed research is carried out in two folds. First, researchers have analyzed the properties of the mechanism for detecting cloned nodes. Second, the researchers have proposed the IRED protocol. The proposed protocol is the enhancement of RED protocol. Here, researchers have focused on preventing the clone attack to pervade. Though the protocol prevents the attack, some attack penetrates into the network. In that scenario, the replicated nodes are detected by IRED. The empirical results show that the proposed protocol IRED has higher resistance against the attack and also performs better in terms of computation, memory and communication. ER -