Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

被引:20
|
作者
Khan, Wazir Zada [1 ]
Aalsalem, Mohammed Y. [2 ]
Saad, Mohammed Naufal Bin Mohammed [1 ]
Xiang, Yang [3 ]
机构
[1] Univ Teknol PETRONAS, Dept Elect & Elect Engn, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci & Informat Syst, Jazan 25142, Saudi Arabia
[3] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
关键词
DISTRIBUTED DETECTION; CLONE ATTACKS; RESILIENT; PROTOCOL; SCHEME;
D O I
10.1155/2013/149023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks
    Wang, Ze
    Zhou, Chang
    Liu, Yiran
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [22] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768
  • [23] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69
  • [24] Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. 2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1085 - +
  • [25] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [26] On Node Replication Attack in Wireless Sensor Networks
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz Ahmed
    [J]. MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2015, 34 (04) : 413 - 424
  • [27] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [28] Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiaoming
    Xiong, Yan
    Chen, Depin
    [J]. 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 225 - 232
  • [29] Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks
    Lou, Yanxiang
    Zhang, Yong
    Liu, Shengli
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2798 - 2803
  • [30] A Survey on Security Attacks in Wireless Sensor Networks
    Gaware, Atul
    Dhonde, S. B.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 536 - 539