CINXE.COM
TY - JFULL AU - N. S. Usha and E. A. Mary Anita PY - 2018/11/ TI - An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks T2 - International Journal of Computer and Information Engineering SP - 796 EP - 804 VL - 12 SN - 1307-6892 UR - https://publications.waset.org/pdf/10009582 PU - World Academy of Science, Engineering and Technology NX - Open Science Index 142, 2018 N2 - Recent innovations in the field of technology led to the use of wireless sensor networks in various applications, which consists of a number of small, very tiny, low-cost, non-tamper proof and resource constrained sensor nodes. These nodes are often distributed and deployed in an unattended environment, so as to collaborate with each other to share data or information. Amidst various applications, wireless sensor network finds a major role in monitoring battle field in military applications. As these non-tamperproof nodes are deployed in an unattended location, they are vulnerable to many security attacks. Amongst many security attacks, the node replication attack seems to be more threatening to the network users. Node Replication attack is caused by an attacker, who catches one true node, duplicates the first certification and cryptographic materials, makes at least one or more copies of the caught node and spots them at certain key positions in the system to screen or disturb the network operations. Preventing the occurrence of such node replication attacks in network is a challenging task. In this survey article, we provide the classification of detection schemes and also explore the various schemes proposed in each category. Also, we compare the various detection schemes against certain evaluation parameters and also its limitations. Finally, we provide some suggestions for carrying out future research work against such attacks. ER -