Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

被引:20
|
作者
Khan, Wazir Zada [1 ]
Aalsalem, Mohammed Y. [2 ]
Saad, Mohammed Naufal Bin Mohammed [1 ]
Xiang, Yang [3 ]
机构
[1] Univ Teknol PETRONAS, Dept Elect & Elect Engn, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci & Informat Syst, Jazan 25142, Saudi Arabia
[3] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
关键词
DISTRIBUTED DETECTION; CLONE ATTACKS; RESILIENT; PROTOCOL; SCHEME;
D O I
10.1155/2013/149023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    [J]. 2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [32] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Rehman, Aqeel-ur
    Rehman, Sadiq Ur
    Raheem, Haris
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2291 - 2313
  • [33] Proficient Algorithms for Replication Attack Detection in Wireless Sensor Networks - A Survey
    Sathish, R.
    Kumar, D. Rajesh
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 1 - 7
  • [34] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Aqeel-ur Rehman
    Sadiq Ur Rehman
    Haris Raheem
    [J]. Wireless Personal Communications, 2019, 106 : 2291 - 2313
  • [35] A Survey on Distributed Techniques for Detection of Node Clones in Wireless Sensor Networks
    Autkar, Shriya V.
    Dhage, M. R.
    Bholane, S. P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [36] Modeling Node Capture Attacks in Wireless Sensor Networks
    Tague, Patrick
    Poovendran, Radha
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1221 - 1224
  • [37] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [38] Survey on node deployment in wireless sensor networks
    王正杰
    钱旭
    张计芬
    赵媛
    郭银景
    [J]. Journal of Measurement Science and Instrumentation, 2012, 3 (01) : 80 - 84
  • [39] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147
  • [40] Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
    Ho, Jun-Won
    Liu, Donggang
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2009, 7 (08) : 1476 - 1488