CFP last date
20 May 2024
Reseach Article

An Overview of Replica Node Detection in Wireless Sensor Networks

Published on April 2012 by V. Ram Prabha, P. Latha
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 7
April 2012
Authors: V. Ram Prabha, P. Latha
54f573f8-3830-4701-b347-8fda767f48ee

V. Ram Prabha, P. Latha . An Overview of Replica Node Detection in Wireless Sensor Networks. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 7 (April 2012), 19-22.

@article{
author = { V. Ram Prabha, P. Latha },
title = { An Overview of Replica Node Detection in Wireless Sensor Networks },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 7 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 19-22 },
numpages = 4,
url = { /proceedings/icon3c/number7/6051-1052/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A V. Ram Prabha
%A P. Latha
%T An Overview of Replica Node Detection in Wireless Sensor Networks
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%V ICON3C
%N 7
%P 19-22
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless Sensor Networks deployed in hostile environment are vulnerable to many attacks due to the nature of deployment and poor physical security. An attacker can take control over the network by compromising few nodes in the network either by extracting the secret keys from the sensor node or reprogram the sensor nodes. After compromising the sensor nodes, making the replicas of them and placing them back to the network , an adversary may perform various types of attacks on the network . Replica node attack is a very hazardous one and must be detected as early as possible to protect the network from those attacks. Many schemes have been proposed for detecting the replica nodes in centralized and distributed environment. In this paper we review these schemes and comparing their performance.

References
  1. H. Choi, S. Zhu, and T. F. La Porta, "SET: Detecting Node Clones in Sensor Networks," Proc. Int'l Conf. Security and Privacy in Comm. Networks and the Workshops (SecureComm '07), pp. 341-350, 2007.
  2. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A Randomized,Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
  3. K. Xing, F. Liu, X. Cheng, and D. Du. Real Time Detection of Clone Attack in Wireless Sensor Networks, In IEEE ICDCS, 2008.
  4. C. -M. Yu, C. -S. Lu, S. -Y. Kuo. Mobile Sensor Network Resilient Against Node Replication Attacks. In IEEE SECON, 2008. (poster)
  5. C. -M. Yu, C. -S. Lu, and S. -Y. Kuo, "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks," Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept. 2009.
  6. J. Ho, M. Wright, and S. K. Das, "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis," Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
  7. M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. Lecture Notes in` Computer Science Vol. 1109, 1996.
  8. W. Du, J. Deng, S. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of ACM Conference on Computer and Communications Security, 2003.
  9. B. Parno, A. Perrig, and V. D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.
  10. A. Becher, Z. Benenson, and M. Dornseif. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. International`Conference on Security in Pervasive Computing, 2006.
  11. S. Capkun and J. -P. Hubaux. Secure Positioning of wireless devices with application to sensor networks. IEEE Infocom, 2005.
  12. S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM conference on Computer and communications security, 2003.
  13. Richard Brooks, P. Y. Govindaraju, Mathew Pretti, N. Vijaykrishnan, M. T. Condemir, "On the detection of clones in sensor using random key predistribution", IEEE transactions on system, man, and cybernetics-part c applications and reviews, vol 37, no. 6, November 2007
  14. C. A. Melchor et. al "Active detection of node replication attacks", IJCSNS International Journal of Computer Science and Network Security, vol 9,no. 2, February 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Replica Node Set Red Edd