A Survey on Node Replication Attack Detection in Wireless Sensor Network  
  Authors : Dilna V ; Sajitha M

 

Wireless Sensor Network (WSN) consists of spatially distributed devices called sensor nodes, which has sensing and wireless communication capabilities. These sensor nodes are normally deployed in heedless and defenseless environment. So it is easy for an adversary to capture a statutory node from the network and create copies of them. And these replicated nodes are deployed back in all network areas and they can be considered as statutory members of the network. So it is difficult to detect a replicated node. There are a number of protocols are introduced to detect node replication attack in distributed environment. This work review these protocols to detect node clones and explain how they done their witness selection for their replica detection in Wireless sensor network.

 

Published In : IJCAT Journal Volume 2, Issue 2

Date of Publication : March

Pages : 66 - 70

Figures :--

Tables : 01

Publication Link :A Survey on Node Replication Attack Detection in Wireless Sensor Network

 

 

 

Dilna V : M-Tech Student, Computer Science and Engineering M. E. S. College of Engineering, Kuttippuram, India

Sajitha M : Assistant Professor, Computer Science and Engineering M. E. S. College of Engineering, Kuttippuram, India

 

 

 

 

 

 

 

Clone Node

Distributed Detection

Node Replication

Wireless Sensor Network

Witness Nodes

Recently the wireless sensor network has been used in many areas. Here this work focused on one of physical attacks known as s node replication attack in the wireless sensor network. The existing techniques for detecting node replication attack in WSN are broadly categorized into two classes distributed and centralized. Both classes of schemes are proficient in detecting and preventing clone attacks, but both schemes also have some noteworthy drawbacks. Here reviewed the existing techniques that can detect a node replication attack on a distributed scheme. However, the current study highlights the fact that there are still a lot of challenges and issues in clone detection schemes that need to be resolved to become more applicable to real life situations and also to become accepted by the resource constrained sensor node.

 

 

 

 

 

 

 

 

 

[1] Bryan Parno, Adrian Perrig, Virgil Gligor ,"Distributed detection of node replication attacks in sensor networks" in Proceeding of the IEEE Symposium on Security and Privacy,(IEEE S and P`05),pp49-63, May 2005 [2] Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelian Xiao, "Memory efficient protocols for detecting node replication attacks in wireless sensor networks", in Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP'09), pp 284-293, Princeton, NJ,USA, October 2009. [3] Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankar das Roy and Lingyu Wang, "Localized multicast: efficient and distributed replica detection in large scale sensor networks", IEEE Transactions on Mobile Computing, Vo1. 9, No. 7, pp 913-926, 2010. [4] Yingpei Zeng, Jiannong Cao, Shigeng Zhang,Shanqing Gao and Li Xie ,Random walk based approach to detect clone attacks in wireless sensor networks, IEEE Journal on selected areas in Communications, Vol. 28, No.5, pp 677-691, 2010 [5] M. Conti, R. Di Pietro, L. Mancini, and A. Mei, A Distributed detection of clone attacks in wireless sensor networks, IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp. 685698, 2011. [6] A. K. Mishra and A. K. Turuk, "A zone-based node replica detection scheme for wireless sensor networks", Springer, Wireless personal communications, vol. 69, no. 2, pp. 601-621, 2013. [7] Kwantae Cho, Byung-Gil Lee, and Dong Hoon Lee, "Low Priced and Energy Efficient Detection of Replicas for Wireless Sensor Networks", IEEE Transactions on dependable and secure computing, Vol. 11, NO. 5, September/October 2014. .[8] S. S. Koshy and M. Sajitha, "Zone based node replica detection in wireless sensor network using trust", International Journal of Computer Trends and Technology, vol. 4, no. 7, pp. 2316-2320, 2013