Detecting node replication attacks in wireless sensor networks: A survey

被引:67
|
作者
Zhu, Wen Tao [1 ]
Zhou, Jianying [2 ]
Deng, Robert H. [3 ]
Bao, Feng [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[2] Inst Infocomm Res, Cryptog & Secur Dept, Singapore 138632, Singapore
[3] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Security; Node replication attack; Detection; DISTRIBUTED DETECTION; SECURITY; SCHEME; AUTHENTICATION; RESILIENT; PROTOCOLS; PRIVACY;
D O I
10.1016/j.jnca.2012.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1022 / 1034
页数:13
相关论文
共 50 条
  • [1] Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohammed Naufal Bin Mohammed
    Xiang, Yang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [2] SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks
    Sujihelen, L.
    Jayakumar, C.
    Senthilsingh, C.
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2447 - 2455
  • [3] Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
    Zhang, Ming
    Khanapure, Vishal
    Chen, Shigang
    Xiao, Xuelian
    [J]. 2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 284 - 293
  • [4] Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, Aduwati
    Rasid, M. Fadlee Abdul
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [5] Detecting and Defending against Replication Attacks in Wireless Sensor Networks
    Chen, Xiang-yi
    Meng, Li-xia
    Zhan, Yong-zhao
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [6] Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
    Znaidi, Wassim
    Minier, Marine
    Ubeda, Stephane
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [7] Detecting node replication attacks in mobile sensor networks: theory and approaches
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 496 - 507
  • [8] A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks
    Meng, Xiangshan
    Lin, Kai
    Li, Keqiu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 1, PROCEEDINGS, 2010, 6081 : 559 - 570
  • [9] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [10] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology., 2011, 26 (04) - 743