Scholarly Research Excellence

Digital Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29110


Select areas to restrict search in scientific publication database:
10009582
An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks
Abstract:
Recent innovations in the field of technology led to the use of   wireless sensor networks in various applications, which consists of a number of small, very tiny, low-cost, non-tamper proof and resource constrained sensor nodes. These nodes are often distributed and deployed in an unattended environment, so as to collaborate with each other to share data or information. Amidst various applications, wireless sensor network finds a major role in monitoring battle field in military applications. As these non-tamperproof nodes are deployed in an unattended location, they are vulnerable to many security attacks. Amongst many security attacks, the node replication attack seems to be more threatening to the network users. Node Replication attack is caused by an attacker, who catches one true node, duplicates the first certification and cryptographic materials, makes at least one or more copies of the caught node and spots them at certain key positions in the system to screen or disturb the network operations. Preventing the occurrence of such node replication attacks in network is a challenging task. In this survey article, we provide the classification of detection schemes and also explore the various schemes proposed in each category. Also, we compare the various detection schemes against certain evaluation parameters and also its limitations. Finally, we provide some suggestions for carrying out future research work against such attacks.
Digital Object Identifier (DOI):

References:

[1] C. Karlof and D. Wagner, “Secure routing in Wireless Sensor Networks: Attacks and Countermeasures”, in proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
[2] Haowen Chan and Adrian Perrig, “Security and Privacy in Sensor Network”, Carnegie Mellon University, Oct.2003.
[3] Haowen Chan, Adrian Perrig and Dawn Song, “Random Key Predistribution Scheme Key for Sensor Networks”, Carnegie Mellon University, 2003.
[4] Bryan Parno, Adrian Perrig and Virgil Gligor, ”Distributed Detection of Node Replication Attacks in Sensor Networks”, in proceedings of the IEEE Symposium on Security and Privacy (IEES and P’05), pp.49-63, May 2005.
[5] Carl Hartung, James Balasalle, Richard Han, “Node Compromise in Sensor Networks: The Need for Secure System (Technical Report CU-CS-990-05)”, Dept of Comp Sci, Univ of Colorado at Boulder, Jan. 2005.
[6] H. Luo, L. Zhang “Statistical en-route filtering of injected false data in sensor network”, in proceedings of the IEEE Journal on Selected areas in Communications, vol., No. 4, Apr. 2005.
[7] Yun Zhou, Yanchao Zhang, Yuguang Fang, “Access control in Wireless Sensor Networks, Elsevier 2006.
[8] B. Parno, M. Luk, E. Gaustad, and A. Perrig, “Secure sensor network routing: A Cleanslate approach”, in Proceedings of the ACM CoNEXT Conference, Dec.2006.
[9] Richard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir., “On the Detection of Clones in Sensor Networks Using Random Key Predistribution”, IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, vol., No. 6, Nov. 2007.
[10] Bo Zhu, et.al, “Efficient Distributed Detection of Node Replication Attacks in Sensor Networks (A Research article)”, Concordia University, 2007.
[11] H. Choi, S. Zhu, T.F.L. Porta, “SET: Detecting node clones in sensor networks”, in proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, pp.341–350, Sep.2007.
[12] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, “A Randomized, Efficient and Distributed Protocol for Detection of Node Replication Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing, Sep. 2007.
[13] C. Bekara, M. Laurent-Maknavicius, “A new protocol for securing wireless sensor networks against nodes replication attacks”, in proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2007.
[14] Richard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir, “On the Detection of Clones in Sensor Networks Using Random Key Predistribution”, IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, vol.,No. 6, Nov. 2007.
[15] Yun Zhou and Yuguang Fang, Yanchao Zhang, “Securing Wireless Sensor Networks: A Survey,” in IEEE Communication Surveys, Vol., No.2, 3rd Quarter 2008.
[16] Jun-Won Ho, “Distributed Detection of Node Capture Attacks in Wireless Sensor Networks”, Smart Wireless Sensor Networks, www.intechopen.com.
[17] Y. Sei and S. Honiden, ”Distributed detection of node replication attacks resilient to many compromised nodes in Wireless Sensor Networks”, in proceedings of the 4th Annual International Conference on Wireless Internet, 2008.
[18] K. Xing, F. Liu, X. Cheng, D. H.C. Du., “Real-time detection of clone attacks in wireless sensor networks”, in proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS), 2008.
[19] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, “Wireless Sensor Network Survey (Computer Networks 52 (2008) 2292–2330)”, Journal homepage: www.elsevier.com/locate/comnet.
[20] Jun-Won Ho∗, Donggang Liu, Matthew Wright, Sajal K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks”, Elsevier Mar. 2009.
[21] Chano, Seungjae Shin, Chanil Park, Hyusoo Yoon, “A resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks”, in IEICE Trans INE & SYST,vol., No.7, July 2009.
[22] R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Data security in unattended wireless sensor networks”, IEEE Transactions on Computers, vol. 58, No. 11, pp. 1500–1511, 2009.
[23] L. Yu and J. Li, “Grouping based resilient statistical en-route filtering for sensor networks”, in the proceedings of the IEEE INFOCOM, 2009.
[24] J.W. Ho, D. Liu, M. Wright, and S. K. Das, “Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks”, Ad Hoc Networks, vol., No. 8, pp. 1476–1488, 2009.
[25] Y. Zeng, J. Cao, S. Zhang, S. Guo, L. Xie.,”Random walk based approach to detect clone attacks in wireless sensor networks”, IEEE Journal on Selected Areas in Communications, vol. 28, No.5, pp.677–691, June 2010.
[26] Yingpei Zeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, Shanqing Guo and Li Xie., “Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communications, vol. 28, No. 5, June 2010.
[27] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: efficient and distributed replica detection in large-scale sensor networks”, IEEE Transactions on Mobile Computing, vol. 9, No. 7, pp. 913–926, 2010.
[28] X. Meng, K. Lin, and K. Li, “Note based randomized and distributed protocol for detecting node replication attack,” in Algorithms and Architectures for Parallel Processing, vol. 6081 of Lecture Notes in Computer Science, pp. 559–570, 2010.
[29] T. Bonaci, P. Lee, L. Bushnell, “Distributed Clone detection in wireless sensor networks: an optimization approach”, in Proceedings of the 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, June 2011.
[30] Deng XM, Xiong Y, “A new protocol for the detection of node replication attacks in mobile wireless sensor networks”, Journal of Computer Science and Technology 26(4): 732{743 July 2011. DOI 10.1007/s11390-011-1172-1
[31] Yuh-Ren Tsai, “Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability”, IEEE Journal on Selected Areas in Communications, Vol. 29, No.7, pp.1480-1490, Aug. 2011.
[32] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei,”Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing, Vol.8, No.5, pp. 685–698, Sep. 2011.
[33] Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, and Yang Xiang, “Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, vol., ArticleID-149023, 22 pages, http://dx.doi.org/10.1155/2013/149023.
[34] Moirangthem Marjit Singh, Ankita Singh and Jyotsna Kumar Mandal, “Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networks”, International Journal of Information and Computation Technology. ISSN 0974-2239 vol.., No. 2 (2014), pp. 153-164 @ International Research Publications House http: //www. irphouse.com

Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007