The Replication Attack in Wireless Sensor Networks: Analysis and Defenses

被引:0
|
作者
Manjula, V. [1 ]
Chellappan, C. [1 ]
机构
[1] Anna Univ, Dept CSE, Madras 600025, Tamil Nadu, India
关键词
Security; Clone; Sybil; Node Replication Attack; wireless sensor network; DISTRIBUTED DETECTION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is important for many sensor network applications. Wireless sensor networks (WSN) are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, adversary collects all the credentials like keys and identity etc. The attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and Sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the Node Replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack, several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 50 条
  • [1] On Node Replication Attack in Wireless Sensor Networks
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz Ahmed
    [J]. MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2015, 34 (04) : 413 - 424
  • [2] The Sybil attack in sensor networks: Analysis & defenses
    Newsome, J
    Shi, E
    Song, D
    Perrig, A
    [J]. IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 259 - 268
  • [3] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [4] Detection of Masked Replication Attack in Wireless Sensor Networks
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohamad Naufal Mohamad
    [J]. PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [5] Node Replication Attack Detection in Distributed Wireless Sensor Networks
    Sujihelen, L.
    Boddu, Rajasekhar
    Murugaveni, S.
    Arnika, Ms
    Haldorai, Anandakumar
    Reddy, Pundru Chandra Shaker
    Feng, Suili
    Qin, Jiayin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [6] Method of detecting the replication attack based on zoning in wireless sensor networks
    Ren, Xiu-Li
    Yang, Wei
    Xue, Jian-Sheng
    Yin, Feng-Jie
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (09): : 2095 - 2100
  • [7] Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks
    Cheng, Guo
    Guo, Songtao
    Yang, Yuanyuan
    Wang, Fei
    [J]. 2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [8] A Modified Algorithm and Protocol for Replication Attack and Prevention for Wireless Sensor Networks
    Shimpi, Bhagyashree
    Shrivastava, Sameeksha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [9] A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
    Kim, Chano
    Shin, Seungjae
    Park, Chanil
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (07): : 1479 - 1483
  • [10] Proficient Algorithms for Replication Attack Detection in Wireless Sensor Networks - A Survey
    Sathish, R.
    Kumar, D. Rajesh
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 1 - 7