On node reproduction attack in wireless sensor networks

  • Authors

    • P. Harini
    2017-12-28
    https://doi.org/10.14419/ijet.v7i1.2.8973
  • Wireless Sensor Networks Security, Node Replication, Clone Node Attack.
  • WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and re- deploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs.

  • References

    1. [1] Padmavathi, G.M.D.S., “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networksâ€, International Journal of Computer Science and Information Security, Volume 4, No. 1, 2009.

      [2] Singh, M.M., Ankita, S., and Jyotsna, K.M., “Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networksâ€, International Journal ofInformation and Computation Technology, Volume 4, No. 2, 2014.

      [3] Ansari, M.H.V.T., “Classification AndAanalysis of Clone Attack Detection Procedures in Mobile Wireless Sensor Networksâ€, International Journal of Scientific and Research Publications, Volume 2, No. 11, 2012.

      [4] Sagar, C.J.G.N., “Survey on Distributed Detection of Clone Attacks in Wireless Sensor Networksâ€, 2014.

      [5] Choi, H., and Thomas, S.Z., “SET: Detecting Node Clones in Sensor Networksâ€, Proceedings of 3rdInternational Conference on Security and Privacy in Communications Networks and the Workshops- SecureComm, 2007.

      [6] Bekara, C., “Defending Against Nodes Replication Attacks on Wireless Sensor Networksâ€, 2012.

      [7] Yu, C.M., “CSI: Compressed Sensing-Based Clone Identification in Sensor Networksâ€, Proceedings of 8thIEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, 2012. https://doi.org/10.1109/PerComW.2012.6197497.

      [8] Parno, B.J., “Distributed Detection of Node Replication Attacks in Sensor Networksâ€, Master Thesis, 2005.

      [9] Bryan, P.A.P, and Gligor, V., “Distributed Detection of Node Replication Attacks in Sensor Networksâ€, IEEE Symposium on Security and Privacy, pp. 49-63, 2005.

      [10] Conti, C., “A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networksâ€, Proceedings of 8thACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007. https://doi.org/10.1145/1288107.1288119.

      [11] Conti, M., “Distributed Detection of Clone Attacks in Wireless Sensor Networksâ€, IEEE Transaction on Dependable and Secure Computing, 2011.

      [12] Zeng, Y., “Random-Walk Based Approach to Detect CloneAttacksin Wireless Sensor Networksâ€, IEEE Journal on Selected Areas in Communications, Volume 28, No. 5, 2010. https://doi.org/10.1109/JSAC.2010.100606.

      [13] Li, Z., and Gong, G., “Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networksâ€, IEEE 6thInternational Conference onMobileAdHocandSensorSystems, 2009.

      [14] Znaidi, W.M.M., and Ubéda, S., “Hierarchical Node Replication Attacks Detection in Wireless Sensor Networksâ€, International Journal of Distributed Sensor Networks, 2013. https://doi.org/10.1155/2013/745069.

      [15] Xia, D., and Vlajic, N., “Near-Optimal Node Clustering inWireless sensor Networks for Environment Monitoringâ€, Proceedings of IEEE 21stInternational Conference on Advanced Information Networking and Applications, 2007.

      [16] Zhu, B., “Efficient Distributed Detection of Node Replication Attacks in Sensor Networksâ€, Proceedings of IEEE 23rdInternational Conference on Computer Security Applications, 2007. https://doi.org/10.1109/ACSAC.2007.26.

      [17] Zhang, M., “Memory Efûcient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networksâ€, Proceedings of 17thIEEE International Conference on Neywork Protocols, 2009.

      [18] Ho, J.W., “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysisâ€, INFOCOM, 2009. https://doi.org/10.1109/INFCOM.2009.5062097.

      [19] Abraham, W., “Sequential Tests of Statistical Hypothesesâ€, TheAnnals of Mathematical Statistics, 1945.

      [20] Raja, G., “Efficient Detection of Node Replication Attacks in Mobile Sensor Networksâ€, International Journal of Innovative Research in Computer and Communication Engineering, Volume 2, No. 2, 2014.

      [21] Balaji, N., and Anitha, M., “Efficient Distributed Detection of Node Replication Attacks in Mobile Sensor Networksâ€, International Journal of Research in Engineering and Technology, 2014.

      [22] Yu, C.M., “Mobile Sensor Network Resilient Against Node Replication Attacksâ€, 5th Annual IEEE Communications Society Conference Sensor on Mesh and Ad Hoc Communications and Networks, 2008. https://doi.org/10.1109/SAHCN.2008.82.

      [23] Yu, C.M., “Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networksâ€, Proceedings of IEEE Conference on Vehicular Technology, 2009. https://doi.org/10.1109/VETECF.2009.5379092.

      [24] Loua, Y., “Single Hop Detection of Node Clone Attacks inMobile Wireless Sensor Networksâ€, ProcediaEngineering, Volume 29, 2012.

      [25] Deng, X., “Mobility-Assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networksâ€, Proceedings of 6thInternational Conference on Wireless and Mobile Computing, Networking and Communications, 2010.

      [26] Jian1, H., “A Range-Based Detection Method of Replication Attacks in Wireless Sensor Networksâ€, Proceedings of International Conference on Information and Computer Networks, 2012.

      [27] Ko, L.C., “A Neighbor-Based Detection Scheme for Wireless Sensor Networks Against Node Replication Attacksâ€, International Conference on Ultra ModernTelecommunications &Workshops, 2009. https://doi.org/10.1109/ICUMT.2009.5345637.

      [28] Khan, W.Z., and Mohammed, Y., “Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Surveyâ€, International Journal of Distributed Sensor Networks, Volume 2013, pp. 22, Article ID 149023,2013.

      [29] Khan, W.Z., Saad, M.N.B.M., Mohammed, Y., “ScrutinisingWell-Known Countermeasures Against Clone Node Attack in Mobile Wireless Sensor Networksâ€, International Journal of Grid and Utility Computing, Volume4,No.2,pp.119-127, 2013. https://doi.org/10.1504/IJGUC.2013.056247.

  • Downloads

  • How to Cite

    Harini, P. (2017). On node reproduction attack in wireless sensor networks. International Journal of Engineering & Technology, 7(1.2), 27-32. https://doi.org/10.14419/ijet.v7i1.2.8973