Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

被引:20
|
作者
Khan, Wazir Zada [1 ]
Aalsalem, Mohammed Y. [2 ]
Saad, Mohammed Naufal Bin Mohammed [1 ]
Xiang, Yang [3 ]
机构
[1] Univ Teknol PETRONAS, Dept Elect & Elect Engn, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci & Informat Syst, Jazan 25142, Saudi Arabia
[3] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
关键词
DISTRIBUTED DETECTION; CLONE ATTACKS; RESILIENT; PROTOCOL; SCHEME;
D O I
10.1155/2013/149023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [2] Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
    Znaidi, Wassim
    Minier, Marine
    Ubeda, Stephane
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [3] Detection and Mitigation of Node Replication with Pulse Delay Attacks in Wireless Sensor Network
    Umrao, Sachin
    Verma, Deeksha
    Tripathi, Arun Kumar
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 390 - +
  • [4] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [5] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology., 2011, 26 (04) - 743
  • [6] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [7] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    [J]. Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [8] Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, Aduwati
    Rasid, M. Fadlee Abdul
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [9] Distributed detection of node replication attacks in sensor networks
    Parno, B
    Perrig, A
    Gligor, V
    [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 49 - 63
  • [10] Deterministic Detection of Node Replication Attacks in Sensor Networks
    Ho, Yu-Shen
    Ma, Ruay-Lien
    Sung, Cheng-En
    Tsai, I-Chen
    Kang, Li-Wei
    Yu, Chia-Mu
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 468 - 469