{"title":"An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks","authors":"N. S. Usha, E. A. Mary Anita","volume":142,"journal":"International Journal of Computer and Information Engineering","pagesStart":797,"pagesEnd":805,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10009582","abstract":"
Recent innovations in the field of technology led to the use of wireless sensor networks in various applications, which consists of a number of small, very tiny, low-cost, non-tamper proof and resource constrained sensor nodes. These nodes are often distributed and deployed in an unattended environment, so as to collaborate with each other to share data or information. Amidst various applications, wireless sensor network finds a major role in monitoring battle field in military applications. As these non-tamperproof nodes are deployed in an unattended location, they are vulnerable to many security attacks. Amongst many security attacks, the node replication attack seems to be more threatening to the network users. Node Replication attack is caused by an attacker, who catches one true node, duplicates the first certification and cryptographic materials, makes at least one or more copies of the caught node and spots them at certain key positions in the system to screen or disturb the network operations. Preventing the occurrence of such node replication attacks in network is a challenging task. In this survey article, we provide the classification of detection schemes and also explore the various schemes proposed in each category. Also, we compare the various detection schemes against certain evaluation parameters and also its limitations. Finally, we provide some suggestions for carrying out future research work against such attacks.<\/p>\r\n","references":"[1]\tC. Karlof and D. Wagner, \u201cSecure routing in Wireless Sensor Networks: Attacks and Countermeasures\u201d, in proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.\r\n[2]\tHaowen Chan and Adrian Perrig, \u201cSecurity and Privacy in Sensor Network\u201d, Carnegie Mellon University, Oct.2003.\r\n[3]\tHaowen Chan, Adrian Perrig and Dawn Song, \u201cRandom Key Predistribution Scheme Key for Sensor Networks\u201d, Carnegie Mellon University, 2003.\r\n[4]\tBryan Parno, Adrian Perrig and Virgil Gligor, \u201dDistributed Detection of Node Replication Attacks in Sensor Networks\u201d, in proceedings of the IEEE Symposium on Security and Privacy (IEES and P\u201905), pp.49-63, May 2005.\r\n[5]\tCarl Hartung, James Balasalle, Richard Han, \u201cNode Compromise in Sensor Networks: The Need for Secure System (Technical Report CU-CS-990-05)\u201d, Dept of Comp Sci, Univ of Colorado at Boulder, Jan. 2005.\r\n[6]\tH. Luo, L. Zhang \u201cStatistical en-route filtering of injected false data in sensor network\u201d, in proceedings of the IEEE Journal on Selected areas in Communications, vol., No. 4, Apr. 2005.\r\n[7]\tYun Zhou, Yanchao Zhang, Yuguang Fang, \u201cAccess control in Wireless Sensor Networks, Elsevier 2006.\r\n[8]\tB. Parno, M. Luk, E. Gaustad, and A. Perrig, \u201cSecure sensor network routing: A Cleanslate approach\u201d, in Proceedings of the ACM CoNEXT Conference, Dec.2006.\r\n[9]\tRichard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir., \u201cOn the Detection of Clones in Sensor Networks Using Random Key Predistribution\u201d, IEEE Transactions on Systems, Man, and Cybernetics\u2014Part C: Applications and Reviews, vol., No. 6, Nov. 2007.\r\n[10]\tBo Zhu, et.al, \u201cEfficient Distributed Detection of Node Replication Attacks in Sensor Networks (A Research article)\u201d, Concordia University, 2007.\r\n[11]\tH. Choi, S. Zhu, T.F.L. Porta, \u201cSET: Detecting node clones in sensor networks\u201d, in proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, pp.341\u2013350, Sep.2007.\r\n[12]\tMauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, \u201cA Randomized, Efficient and Distributed Protocol for Detection of Node Replication Attacks in Wireless Sensor Networks\u201d, IEEE Transactions on Dependable and Secure Computing, Sep. 2007.\r\n[13]\tC. Bekara, M. Laurent-Maknavicius, \u201cA new protocol for securing wireless sensor networks against nodes replication attacks\u201d, in proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2007.\r\n[14]\tRichard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir, \u201cOn the Detection of Clones in Sensor Networks Using Random Key Predistribution\u201d, IEEE Transactions on Systems, Man, and Cybernetics\u2014Part C: Applications and Reviews, vol.,No. 6, Nov. 2007.\r\n[15]\tYun Zhou and Yuguang Fang, Yanchao Zhang, \u201cSecuring Wireless Sensor Networks: A Survey,\u201d in IEEE Communication Surveys, Vol., No.2, 3rd Quarter 2008.\r\n[16]\t Jun-Won Ho, \u201cDistributed Detection of Node Capture Attacks in Wireless Sensor Networks\u201d, Smart Wireless Sensor Networks, www.intechopen.com.\r\n[17]\tY. Sei and S. Honiden, \u201dDistributed detection of node replication attacks resilient to many compromised nodes in Wireless Sensor Networks\u201d, in proceedings of the 4th Annual International Conference on Wireless Internet, 2008.\r\n[18]\tK. Xing, F. Liu, X. Cheng, D. H.C. Du., \u201cReal-time detection of clone attacks in wireless sensor networks\u201d, in proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS), 2008.\r\n[19]\tJennifer Yick, Biswanath Mukherjee, Dipak Ghosal, \u201cWireless Sensor Network Survey (Computer Networks 52 (2008) 2292\u20132330)\u201d, Journal homepage: www.elsevier.com\/locate\/comnet.\r\n[20]\tJun-Won Ho\u2217, Donggang Liu, Matthew Wright, Sajal K. Das, \u201cDistributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks\u201d, Elsevier Mar. 2009.\r\n[21]\tChano, Seungjae Shin, Chanil Park, Hyusoo Yoon, \u201cA resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks\u201d, in IEICE Trans INE & SYST,vol., No.7, July 2009.\r\n[22]\tR. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, \u201cData security in unattended wireless sensor networks\u201d, IEEE Transactions on Computers, vol. 58, No. 11, pp. 1500\u20131511, 2009.\r\n[23]\tL. Yu and J. Li, \u201cGrouping based resilient statistical en-route filtering for sensor networks\u201d, in the proceedings of the IEEE INFOCOM, 2009.\r\n[24]\tJ.W. Ho, D. Liu, M. Wright, and S. K. Das, \u201cDistributed detection of replica node attacks with group deployment knowledge in wireless sensor networks\u201d, Ad Hoc Networks, vol., No. 8, pp. 1476\u20131488, 2009.\r\n[25]\tY. Zeng, J. Cao, S. Zhang, S. Guo, L. Xie.,\u201dRandom walk based approach to detect clone attacks in wireless sensor networks\u201d, IEEE Journal on Selected Areas in Communications, vol. 28, No.5, pp.677\u2013691, June 2010.\r\n[26]\tYingpei Zeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, Shanqing Guo and Li Xie., \u201cRandom-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks\u201d, IEEE Journal on Selected Areas in Communications, vol. 28, No. 5, June 2010.\r\n[27]\tB. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, \u201cLocalized multicast: efficient and distributed replica detection in large-scale sensor networks\u201d, IEEE Transactions on Mobile Computing, vol. 9, No. 7, pp. 913\u2013926, 2010.\r\n[28]\tX. Meng, K. Lin, and K. Li, \u201cNote based randomized and distributed protocol for detecting node replication attack,\u201d in Algorithms and Architectures for Parallel Processing, vol. 6081 of Lecture Notes in Computer Science, pp. 559\u2013570, 2010.\r\n[29]\tT. Bonaci, P. Lee, L. Bushnell, \u201cDistributed Clone detection in wireless sensor networks: an optimization approach\u201d, in Proceedings of the 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, June 2011.\r\n[30]\tDeng XM, Xiong Y, \u201cA new protocol for the detection of node replication attacks in mobile wireless sensor networks\u201d, Journal of Computer Science and Technology 26(4): 732{743 July 2011. DOI 10.1007\/s11390-011-1172-1\r\n[31]\tYuh-Ren Tsai, \u201cLocation Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability\u201d, IEEE Journal on Selected Areas in Communications, Vol. 29, No.7, pp.1480-1490, Aug. 2011.\r\n[32]\tMauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei,\u201dDistributed Detection of Clone Attacks in Wireless Sensor Networks\u201d, IEEE Transactions on Dependable and Secure Computing, Vol.8, No.5, pp. 685\u2013698, Sep. 2011.\r\n[33]\tWazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, and Yang Xiang, \u201cDetection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey\u201d, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, vol., ArticleID-149023, 22 pages, http:\/\/dx.doi.org\/10.1155\/2013\/149023.\r\n[34]\tMoirangthem Marjit Singh, Ankita Singh and Jyotsna Kumar Mandal, \u201cTowards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networks\u201d, International Journal of Information and Computation Technology. ISSN 0974-2239 vol.., No. 2 (2014), pp. 153-164 @ International Research Publications House http: \/\/www. irphouse.com","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 142, 2018"}