Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Exhaustive Survey on Physical Node Capture Attack in WSN

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 3
Year of Publication: 2014
Bhavana Butani
Piyush Kumar Shukla
Sanjay Silakari

Bhavana Butani, Piyush Kumar Shukla and Sanjay Silakari. Article: An Exhaustive Survey on Physical Node Capture Attack in WSN. International Journal of Computer Applications 95(3):32-39, June 2014. Full text available. BibTeX

	author = {Bhavana Butani and Piyush Kumar Shukla and Sanjay Silakari},
	title = {Article: An Exhaustive Survey on Physical Node Capture Attack in WSN},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {3},
	pages = {32-39},
	month = {June},
	note = {Full text available}


Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key information from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing modeling techniques of node capture attack in wireless sensor network. It also analyzes various detection and key predistribution schemes for inventing a new scheme to improve resilience against node capture attack. .


  • Amar Rasheed and Rabi N. Mahapatra, Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks, IEEE Trans. Parallel and Distributed Systems, 2011, vol. 22, no. 1, pp. 176-184.
  • Bryan Parno, Adrian Perrig, and Virgil Gligor, Distributed detection of node replication attacks in sensor networks, In Proceedings of the IEEE Symposium on Security and Privacy, May 2005, pages 49–63. IEEE.
  • Bonaci T, Bushnell L, Poovendran R, Node capture attacks in wireless sensor networks: a system theoretic approach, In: Proc IEEE 49th international conference on decision and control, 2010, pp 6765–6772.
  • Chi Lin, Guowei Wu, Feng Xia, Lin Yao, Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set, Mobile Networks and Applications, 2013, vol. 18(6), pp 908-922.
  • Chi Lin, GW, Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach, J Supercomput, 2013.
  • De P, Liu Y, Das S, Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory, ACM Trans Sens Netw, 2009, 5(3):1–33.
  • H. Chan, A. Perrig, and D. Song, Random Key Predistribution Schemes for Sensor Networks, in Proc. IEEE Sym. Security and Privacy, 2003, pp. 197.
  • Jun-Won Ho, Distributed Detection of Node Capture Attacks in Wireless Sensor Networks, In Smart Wireless Sensor Networks, 2010, pp. 345-360.
  • K. Shaila, S. H. Manjula, J. Thriveni, K. R. Venugopal, and L. M. Patnaik, Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks, International Journal on Computer Science and Engineering, 2011, vol. 3, pp. 3490-3501.
  • Mishra A, Turuk A, Adversary information gathering model for node capture attack in wireless sensor networks, In: Proc IEEE international conference in devices and communication, 2010, pp 1–5.
  • Ruhma Tahir,Klaus McDonald-Maier, Improving resilience against Node capture Attack in Wireless Senosr Networks using ICmetrics, In IEEE3rd international conference on Emerging Seciruty Technologies, 2012
  • S. H. Jokhio, I. A. Jokhio, A. H. Kemp, Node capture attack detection and defence in wireless sensor networks, IEEE IET Jounnals & Magazines, 2011, vol. 2(3),pp. 161-169.
  • Sarmad Ullah khan,Luciano Lavagno, Claudio Pastrone, A Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Network, in IEEE 6th ICET, 2010, pp. 364-369.
  • T. D. Subash, C. Divya, Double Hash Function Scheme In Wireless Sensor Networks, IEEE Information and communication technologies, 2011, pp. 88-92.
  • Tague P, Slater D, Rogers J, Poovendran R, Evaluating the vulnerability of network traffic using joint security and routing analysis, IEEE Trans Dependable Secure Comput,2008, 6(2):111–123.
  • Tague P, Poovendran R, Modeling node capture attacks in wireless sensor networks, In: Proc 46th annual Allerton conference on communication, control, and computing, 2008, pp 1221–1224.
  • Tague P, Poovendran R, Modeling adaptive node capture attacks in multi-hop wireless networks, Ad Hoc Netw, 2007 5(6):801–814.
  • V. J. Rathod, M. Mehta, Security in Wireless Sensor Network:A Survey, Ganpat Univ. J Eng Technology, 2011, vol. 1, no. 1, pp. 35-44.
  • Wu G, Chen X, Obaidat MS, Lin C, A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set, Secur Commun Netw, 2012.
  • Yong Wang, Garhan Attebury, and Byrav Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, , Second Quarter 2006, 8(2) :02–23
  • Bhavana Butani, Piyush Kumar Shukla and Sanjay Silakari, An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network, In igi-global (Under Process).