Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node repl...

Full description

Saved in:
Bibliographic Details
Main Authors: Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang
Format: Article
Language:English
Published: Wiley 2013-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/149023
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849684101164957696
author Wazir Zada Khan
Mohammed Y. Aalsalem
Mohammed Naufal Bin Mohammed Saad
Yang Xiang
author_facet Wazir Zada Khan
Mohammed Y. Aalsalem
Mohammed Naufal Bin Mohammed Saad
Yang Xiang
author_sort Wazir Zada Khan
collection DOAJ
description Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.
format Article
id doaj-art-c6db10481d9e49e4a08ec1ec81868fa9
institution DOAJ
issn 1550-1477
language English
publishDate 2013-05-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-c6db10481d9e49e4a08ec1ec81868fa92025-08-20T03:23:34ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/149023Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A SurveyWazir Zada Khan0Mohammed Y. Aalsalem1Mohammed Naufal Bin Mohammed Saad2Yang Xiang3 Electrical and Electronic Engineering Department, Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia School of Computer Science & Information System, Jazan University, Jazan 45142, Saudi Arabia Electrical and Electronic Engineering Department, Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia School of Information Technology, Deakin University, 221 Burwood Highway, Burwood, Melbourne, VIC 3125, AustraliaWireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.https://doi.org/10.1155/2013/149023
spellingShingle Wazir Zada Khan
Mohammed Y. Aalsalem
Mohammed Naufal Bin Mohammed Saad
Yang Xiang
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
International Journal of Distributed Sensor Networks
title Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
title_full Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
title_fullStr Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
title_full_unstemmed Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
title_short Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
title_sort detection and mitigation of node replication attacks in wireless sensor networks a survey
url https://doi.org/10.1155/2013/149023
work_keys_str_mv AT wazirzadakhan detectionandmitigationofnodereplicationattacksinwirelesssensornetworksasurvey
AT mohammedyaalsalem detectionandmitigationofnodereplicationattacksinwirelesssensornetworksasurvey
AT mohammednaufalbinmohammedsaad detectionandmitigationofnodereplicationattacksinwirelesssensornetworksasurvey
AT yangxiang detectionandmitigationofnodereplicationattacksinwirelesssensornetworksasurvey