CINXE.COM
An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks</title> <meta name="description" content="An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks"> <meta name="keywords" content="Clone node, data security, detection schemes, node replication attack, wireless sensor networks."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <meta name="citation_title" content="An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks"> <meta name="citation_author" content="N. S. Usha"> <meta name="citation_author" content="E. A. Mary Anita"> <meta name="citation_publication_date" content="2018/09/01"> <meta name="citation_journal_title" content="International Journal of Computer and Information Engineering"> <meta name="citation_volume" content="12"> <meta name="citation_issue" content="10"> <meta name="citation_firstpage" content="797"> <meta name="citation_lastpage" content="804"> <meta name="citation_pdf_url" content="https://publications.waset.org/10009582/pdf"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value=""> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 33093</div> </div> </div> </div> <div class="card publication-listing mt-3 mb-3"> <h5 class="card-header" style="font-size:.9rem">An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=N.%20S.%20Usha">N. S. Usha</a>, <a href="https://publications.waset.org/search?q=E.%20A.%20Mary%20Anita"> E. A. Mary Anita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Recent innovations in the field of technology led to the use of wireless sensor networks in various applications, which consists of a number of small, very tiny, low-cost, non-tamper proof and resource constrained sensor nodes. These nodes are often distributed and deployed in an unattended environment, so as to collaborate with each other to share data or information. Amidst various applications, wireless sensor network finds a major role in monitoring battle field in military applications. As these non-tamperproof nodes are deployed in an unattended location, they are vulnerable to many security attacks. Amongst many security attacks, the node replication attack seems to be more threatening to the network users. Node Replication attack is caused by an attacker, who catches one true node, duplicates the first certification and cryptographic materials, makes at least one or more copies of the caught node and spots them at certain key positions in the system to screen or disturb the network operations. Preventing the occurrence of such node replication attacks in network is a challenging task. In this survey article, we provide the classification of detection schemes and also explore the various schemes proposed in each category. Also, we compare the various detection schemes against certain evaluation parameters and also its limitations. Finally, we provide some suggestions for carrying out future research work against such attacks.</p> <iframe src="https://publications.waset.org/10009582.pdf" style="width:100%; height:400px;" frameborder="0"></iframe> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Clone%20node" title="Clone node">Clone node</a>, <a href="https://publications.waset.org/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/search?q=detection%20schemes" title=" detection schemes"> detection schemes</a>, <a href="https://publications.waset.org/search?q=node%20replication%20attack" title=" node replication attack"> node replication attack</a>, <a href="https://publications.waset.org/search?q=wireless%20sensor%20networks." title=" wireless sensor networks."> wireless sensor networks.</a> </p> <p class="card-text"><strong>Digital Object Identifier (DOI):</strong> <a href="https://doi.org/10.5281/zenodo.1474723" target="_blank">doi.org/10.5281/zenodo.1474723</a> </p> <a href="https://publications.waset.org/10009582/an-elaborate-survey-on-node-replication-attack-in-static-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10009582/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10009582/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10009582/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10009582/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10009582/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10009582/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10009582/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10009582/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10009582/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10009582/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10009582.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">807</span> </span> <p class="card-text"><strong>References:</strong></p> <br>[1] C. Karlof and D. Wagner, “Secure routing in Wireless Sensor Networks: Attacks and Countermeasures”, in proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003. <br>[2] Haowen Chan and Adrian Perrig, “Security and Privacy in Sensor Network”, Carnegie Mellon University, Oct.2003. <br>[3] Haowen Chan, Adrian Perrig and Dawn Song, “Random Key Predistribution Scheme Key for Sensor Networks”, Carnegie Mellon University, 2003. <br>[4] Bryan Parno, Adrian Perrig and Virgil Gligor, ”Distributed Detection of Node Replication Attacks in Sensor Networks”, in proceedings of the IEEE Symposium on Security and Privacy (IEES and P’05), pp.49-63, May 2005. <br>[5] Carl Hartung, James Balasalle, Richard Han, “Node Compromise in Sensor Networks: The Need for Secure System (Technical Report CU-CS-990-05)”, Dept of Comp Sci, Univ of Colorado at Boulder, Jan. 2005. <br>[6] H. Luo, L. Zhang “Statistical en-route filtering of injected false data in sensor network”, in proceedings of the IEEE Journal on Selected areas in Communications, vol., No. 4, Apr. 2005. <br>[7] Yun Zhou, Yanchao Zhang, Yuguang Fang, “Access control in Wireless Sensor Networks, Elsevier 2006. <br>[8] B. Parno, M. Luk, E. Gaustad, and A. Perrig, “Secure sensor network routing: A Cleanslate approach”, in Proceedings of the ACM CoNEXT Conference, Dec.2006. <br>[9] Richard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir., “On the Detection of Clones in Sensor Networks Using Random Key Predistribution”, IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, vol., No. 6, Nov. 2007. <br>[10] Bo Zhu, et.al, “Efficient Distributed Detection of Node Replication Attacks in Sensor Networks (A Research article)”, Concordia University, 2007. <br>[11] H. Choi, S. Zhu, T.F.L. Porta, “SET: Detecting node clones in sensor networks”, in proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, pp.341–350, Sep.2007. <br>[12] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, “A Randomized, Efficient and Distributed Protocol for Detection of Node Replication Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing, Sep. 2007. <br>[13] C. Bekara, M. Laurent-Maknavicius, “A new protocol for securing wireless sensor networks against nodes replication attacks”, in proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2007. <br>[14] Richard Brooks, P. Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, Mahmut T. Kandemir, “On the Detection of Clones in Sensor Networks Using Random Key Predistribution”, IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, vol.,No. 6, Nov. 2007. <br>[15] Yun Zhou and Yuguang Fang, Yanchao Zhang, “Securing Wireless Sensor Networks: A Survey,” in IEEE Communication Surveys, Vol., No.2, 3rd Quarter 2008. <br>[16] Jun-Won Ho, “Distributed Detection of Node Capture Attacks in Wireless Sensor Networks”, Smart Wireless Sensor Networks, www.intechopen.com. <br>[17] Y. Sei and S. Honiden, ”Distributed detection of node replication attacks resilient to many compromised nodes in Wireless Sensor Networks”, in proceedings of the 4th Annual International Conference on Wireless Internet, 2008. <br>[18] K. Xing, F. Liu, X. Cheng, D. H.C. Du., “Real-time detection of clone attacks in wireless sensor networks”, in proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS), 2008. <br>[19] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, “Wireless Sensor Network Survey (Computer Networks 52 (2008) 2292–2330)”, Journal homepage: www.elsevier.com/locate/comnet. <br>[20] Jun-Won Ho∗, Donggang Liu, Matthew Wright, Sajal K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks”, Elsevier Mar. 2009. <br>[21] Chano, Seungjae Shin, Chanil Park, Hyusoo Yoon, “A resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks”, in IEICE Trans INE & SYST,vol., No.7, July 2009. <br>[22] R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Data security in unattended wireless sensor networks”, IEEE Transactions on Computers, vol. 58, No. 11, pp. 1500–1511, 2009. <br>[23] L. Yu and J. Li, “Grouping based resilient statistical en-route filtering for sensor networks”, in the proceedings of the IEEE INFOCOM, 2009. <br>[24] J.W. Ho, D. Liu, M. Wright, and S. K. Das, “Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks”, Ad Hoc Networks, vol., No. 8, pp. 1476–1488, 2009. <br>[25] Y. Zeng, J. Cao, S. Zhang, S. Guo, L. Xie.,”Random walk based approach to detect clone attacks in wireless sensor networks”, IEEE Journal on Selected Areas in Communications, vol. 28, No.5, pp.677–691, June 2010. <br>[26] Yingpei Zeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, Shanqing Guo and Li Xie., “Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communications, vol. 28, No. 5, June 2010. <br>[27] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: efficient and distributed replica detection in large-scale sensor networks”, IEEE Transactions on Mobile Computing, vol. 9, No. 7, pp. 913–926, 2010. <br>[28] X. Meng, K. Lin, and K. Li, “Note based randomized and distributed protocol for detecting node replication attack,” in Algorithms and Architectures for Parallel Processing, vol. 6081 of Lecture Notes in Computer Science, pp. 559–570, 2010. <br>[29] T. Bonaci, P. Lee, L. Bushnell, “Distributed Clone detection in wireless sensor networks: an optimization approach”, in Proceedings of the 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, June 2011. <br>[30] Deng XM, Xiong Y, “A new protocol for the detection of node replication attacks in mobile wireless sensor networks”, Journal of Computer Science and Technology 26(4): 732{743 July 2011. DOI 10.1007/s11390-011-1172-1 <br>[31] Yuh-Ren Tsai, “Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability”, IEEE Journal on Selected Areas in Communications, Vol. 29, No.7, pp.1480-1490, Aug. 2011. <br>[32] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei,”Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing, Vol.8, No.5, pp. 685–698, Sep. 2011. <br>[33] Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, and Yang Xiang, “Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, vol., ArticleID-149023, 22 pages, http://dx.doi.org/10.1155/2013/149023. <br>[34] Moirangthem Marjit Singh, Ankita Singh and Jyotsna Kumar Mandal, “Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networks”, International Journal of Information and Computation Technology. ISSN 0974-2239 vol.., No. 2 (2014), pp. 153-164 @ International Research Publications House http: //www. irphouse.com </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>