Wireless Sensor Network (WSN) consists of
spatially distributed devices called sensor nodes, which has
sensing and wireless communication capabilities. These sensor
nodes are normally deployed in heedless and defenseless
environment. So it is easy for an adversary to capture a statutory
node from the network and create copies of them. And these
replicated nodes are deployed back in all network areas and they
can be considered as statutory members of the network. So it is
difficult to detect a replicated node. There are a number of
protocols are introduced to detect node replication attack in
distributed environment. This work review these protocols to
detect node clones and explain how they done their witness
selection for their replica detection in Wireless sensor network.
Published In : IJCAT Journal Volume 2, Issue 2
Date of Publication : March
Pages : 66 - 70
Figures :--
Tables : 01
Publication Link :A Survey on Node Replication Attack Detection in
Wireless Sensor Network
Dilna V : M-Tech Student, Computer Science and Engineering
M. E. S. College of Engineering, Kuttippuram, India
Sajitha M : Assistant Professor, Computer Science and Engineering
M. E. S. College of Engineering, Kuttippuram, India
Clone Node
Distributed Detection
Node
Replication
Wireless Sensor Network
Witness Nodes
Recently the wireless sensor network has been used in
many areas. Here this work focused on one of physical
attacks known as s node replication attack in the wireless
sensor network. The existing techniques for detecting
node replication attack in WSN are broadly categorized
into two classes distributed and centralized. Both classes
of schemes are proficient in detecting and preventing
clone attacks, but both schemes also have some
noteworthy drawbacks. Here reviewed the existing
techniques that can detect a node replication attack on a
distributed scheme. However, the current study highlights
the fact that there are still a lot of challenges and issues in
clone detection schemes that need to be resolved to
become more applicable to real life situations and also to
become accepted by the resource constrained sensor node.
[1] Bryan Parno, Adrian Perrig, Virgil
Gligor ,"Distributed detection of node replication
attacks in sensor networks" in Proceeding of the IEEE
Symposium on Security and Privacy,(IEEE S and
P`05),pp49-63, May 2005
[2] Ming Zhang, Vishal Khanapure, Shigang Chen,
Xuelian Xiao, "Memory efficient protocols for
detecting node replication attacks in wireless sensor
networks", in Proceedings of the 17th IEEE
International Conference on Network Protocols
(ICNP'09), pp 284-293, Princeton, NJ,USA, October
2009.
[3] Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankar das
Roy and Lingyu Wang, "Localized multicast: efficient
and distributed replica detection in large scale sensor networks", IEEE Transactions on Mobile Computing,
Vo1. 9, No. 7, pp 913-926, 2010.
[4] Yingpei Zeng, Jiannong Cao, Shigeng Zhang,Shanqing
Gao and Li Xie ,Random walk based approach to
detect clone attacks in wireless sensor networks, IEEE
Journal on selected areas in Communications, Vol. 28,
No.5, pp 677-691, 2010
[5] M. Conti, R. Di Pietro, L. Mancini, and A. Mei, A
Distributed detection of clone attacks in wireless
sensor networks, IEEE Transactions on Dependable
and Secure Computing, vol. 8, no. 5, pp. 685698, 2011.
[6] A. K. Mishra and A. K. Turuk, "A zone-based node
replica detection scheme for wireless sensor
networks", Springer, Wireless personal
communications, vol. 69, no. 2, pp. 601-621, 2013.
[7] Kwantae Cho, Byung-Gil Lee, and Dong Hoon Lee,
"Low Priced and Energy Efficient Detection of
Replicas for Wireless Sensor Networks", IEEE
Transactions on dependable and secure computing,
Vol. 11, NO. 5, September/October 2014.
.[8] S. S. Koshy and M. Sajitha, "Zone based node replica
detection in wireless sensor network using trust",
International Journal of Computer Trends and
Technology, vol. 4, no. 7, pp. 2316-2320, 2013