Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks

被引:0
|
作者
Khan, Wazir Zada [1 ]
Saad, Mohamad Naufal bin Mohamad [1 ]
Aalsalem, Mohammed Y. [2 ]
机构
[1] Univ Teknol PETRONAS, Elect & Elect Engn Dept, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci, Jazan, Saudi Arabia
关键词
clone attack; node replication attack; mobile sensor network; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are often deployed in unattended environments where an adversary can easily physically capture and compromise sensor nodes. She then creates replicas of the compromised nodes instigating further attacks by spreading these replicas over the network, incurring serious damages to the network, so these replicas should be detected as early as possible. Most of the previous research efforts on detecting replica node attacks adopt static network models which are not suitable for mobile WSNs. In mobile WSN, sensor nodes are freely and randomly roaming all the time and they do not have any fixed neighbour to communicate with because these mobile nodes meet with one another occasionally and in an unpredictable manner. In this paper, we have surveyed all the existing solutions proposed so far for the detection of replica or clone nodes in mobile WSN by comparing them comprehensively and pointing out their drawbacks and shortcomings.
引用
收藏
页码:119 / 127
页数:9
相关论文
共 50 条
  • [21] Evaluation of well-known protocol implementation techniques for application in wireless networks
    Langendörfer, P
    Kraemer, R
    König, H
    JOURNAL OF SUPERCOMPUTING, 2001, 20 (02): : 161 - 173
  • [22] Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks
    Peter Langendörfer
    Rolf Kraemer
    Hartmut König
    The Journal of Supercomputing, 2001, 20 : 161 - 173
  • [23] Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
    P. Uma Maheswari
    P. Ganesh Kumar
    Wireless Personal Communications, 2017, 94 : 2043 - 2054
  • [24] Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
    Maheswari, P. Uma
    Kumar, P. Ganesh
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2043 - 2054
  • [25] Evaluation of well-known protocol implementation techniques for application in mobile networks
    Langendörfer, P
    König, H
    IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 451 - 457
  • [26] Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 214 - 219
  • [27] Racemote: A mobile node for wireless sensor networks
    Song, Guangming
    Zhuang, Wei
    Wei, Zhigang
    Song, Aiguo
    2006 IEEE SENSORS, VOLS 1-3, 2006, : 781 - +
  • [28] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [29] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [30] Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks
    Jamshidi, Mojtaba
    Esnaashari, Mehdi
    Darwesh, Aso Mohammad
    Meybodi, Mohammad Reza
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (01) : 102 - 115