Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

被引:20
|
作者
Khan, Wazir Zada [1 ]
Aalsalem, Mohammed Y. [2 ]
Saad, Mohammed Naufal Bin Mohammed [1 ]
Xiang, Yang [3 ]
机构
[1] Univ Teknol PETRONAS, Dept Elect & Elect Engn, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci & Informat Syst, Jazan 25142, Saudi Arabia
[3] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
关键词
DISTRIBUTED DETECTION; CLONE ATTACKS; RESILIENT; PROTOCOL; SCHEME;
D O I
10.1155/2013/149023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks
    Meng, Xiangshan
    Lin, Kai
    Li, Keqiu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 1, PROCEEDINGS, 2010, 6081 : 559 - 570
  • [42] Detecting and Defending against Replication Attacks in Wireless Sensor Networks
    Chen, Xiang-yi
    Meng, Li-xia
    Zhan, Yong-zhao
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [43] Dishonest Recommendation Attacks in Wireless Sensor Networks: A Survey
    Khedim, Farah
    Labraoui, Nabila
    Lehsaini, Mohamed
    [J]. 2015 12TH IEEE INTERNATIONAL CONFERENCE ON PROGRAMMING AND SYSTEMS (ISPS), 2015, : 41 - 50
  • [44] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [45] Imposter detection for replication attacks in mobile sensor networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    [J]. COMPUTER NETWORKS, 2016, 108 : 210 - 222
  • [46] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
    Ramasamy, Lakshmana Kumar
    Khan, Firoz K. P.
    Imoize, Agbotiname Lucky
    Ogbebor, Joshua O.
    Kadry, Seifedine
    Rho, Seungmin
    [J]. IEEE ACCESS, 2021, 9 : 128765 - 128785
  • [47] Imposter Detection for Replication Attacks in Mobile Sensor Networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [48] On the Resilience to Node Capture Attacks of Secure Wireless Sensor Networks
    Zhao, Jun
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 887 - 893
  • [49] Detection of Node Failure in Wireless Sensor Networks
    Rehena, Zeenat
    Mukherjee, Rajesh
    Roy, Sarbani
    Mukherjee, Nandini
    [J]. 2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 133 - 138
  • [50] DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORKS
    Padmaja, P.
    Marutheswar, G. V.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,