CFP last date
20 May 2024
Reseach Article

Network Management by Tackling Replication Attacks: A Comparative Study

by Deepa Byadgi, A M Prasad, Suma V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 6
Year of Publication: 2015
Authors: Deepa Byadgi, A M Prasad, Suma V
10.5120/19324-1075

Deepa Byadgi, A M Prasad, Suma V . Network Management by Tackling Replication Attacks: A Comparative Study. International Journal of Computer Applications. 110, 6 ( January 2015), 41-46. DOI=10.5120/19324-1075

@article{ 10.5120/19324-1075,
author = { Deepa Byadgi, A M Prasad, Suma V },
title = { Network Management by Tackling Replication Attacks: A Comparative Study },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 6 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number6/19324-1075/ },
doi = { 10.5120/19324-1075 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:41.281165+05:30
%A Deepa Byadgi
%A A M Prasad
%A Suma V
%T Network Management by Tackling Replication Attacks: A Comparative Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 6
%P 41-46
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network is an interaction or engaging in formal or informal communication among systems to exchange information by mutual assistance or support. The sharing of resources helps the users on the network to communicate with each other. Node in a wireless sensor network that is capable of performance handling, gathering information and communicating with other connected nodes in the network are called sensor nodes. Sensor nodes, despite of having limited resources are useful in many applications. Wireless sensor networks have become an intensive research area where the security is of concern. An adversary can capture a node with a very little effort, analyze and replicate them easily. If a node is captured, an adversary reprograms it and replicate into larger number of clones, thus disrupts the entire network. Security is the most important criteria for senor networks. Various approaches are proposed for effective management of replication attacks. This paper thus shows the different approaches involved in detection of replicated nodes in mobile sensor networks and comparison of the methods involved and hitches of the previous approaches.

References
  1. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "Distributed detection of clone attacks in wireless sensor networks," IEEE Trans. Depend. Secure Comput. , vol. 8, no. 5, pp. 685–698, Sep. /Oct. 2012.
  2. M. Conti, R. Di Pietro, L. V. Mancini, andA. Mei, "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, Canada, 2007,pp80–89.
  3. B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2005, pp. 49–63.
  4. K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego, CA, USA, 2010, pp. 1–9.
  5. Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor networks," IEEE J. Sel. Areas Commun. , vol. 28, no. 5, pp. 677–691, Jun. 2010.
  6. J. Ho,M. Wright, and S. K. Das, "Fast detection of replica node attacks in mobile sensor networks using sequential analysis," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Brazil, 2009, pp. 1773–1781.
  7. C. -M. Yu, C. -S. Lu, and S. -Y. Kuo, "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall), Anchorage, AK, USA, 2009, pp. 1–5.
  8. C. -M. Yu, C. -S. Lu, and S. -Y. Kuo, "Mobile sensor network resilient against node replication attacks," in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 597–599, (poster).
  9. Xiaoming Deng, Yan Xiong, and Depin Chen , "Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks" 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
  10. M. Zhang, V. Khanapure, S. Chen, and X. Xiao, "Memory efficient protocols for detecting node replication attacks in wireless sensor networks," in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton,NJ, USA, 2009, pp. 284–293.
  11. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, "On the detection of clones in sensor networks using random key predistribution," IEEE Trans. Syst. , Man, Cybern. C, Applicat. Rev. , vol. 37, no. 6, pp. 1246–1258, Nov. 2007.
  12. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, "Localized multicast: Efficient and distributed replica detection in large-scale sensor networks," IEEE Trans. Mobile Comput. , vol. 9, no. 7, pp. 913–926, Jul. 2010.
  13. K. Xing, F. Liu, X. Cheng, and D. Du, "Real time detection of clone attack in wireless sensor networks," in Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS), Beijing, China, 2008, pp. 3–10.
  14. H. Choi, S. Zhu, and T. F. La Porta, "SET: Detecting node clones in sensor networks," in Proc. Int. ICST Conf. Security and Privacy in Communication Networks (Securecomm), Nice, France, 2007, pp. 341–350.
  15. J. Yi, J. Koo, and H. Cha, "A localization technique for mobile sensor networks using archived anchor information," in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 64–72.
  16. J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Berkeley, CA, USA, 2004, pp. 259–268
  17. M. Conti, R. D. Pietro, and A. Spognardi, "Wireless sensor replica detection in mobile environment," in Proc. Int. Conf. Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012, pp. 249–264.
  18. Kyoung-lae, N. , Serpedin, E. , and Qaraqe, K. 2008. A New Approach for Time Synchronization in Wireless Sensor Networks: Pairwise Broadcast Synchronization. Wireless Communications, IEEE Trans. , vol. 7, no. 9, pp. 3318-3322.
  19. Chia-Mu Yu, Yao-Tsou, Chun-Shien Lu, Member, IEEE, and Sy-Yen Kuo,Fellow, IEEE, Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks IEEE Trans. on Information And Security, vol 8, NO 5,May 2013
Index Terms

Computer Science
Information Sciences

Keywords

WSN MSN Adversary Replica