On Node Replication Attack in Wireless Sensor Networks
WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Mehran University of Engineering and Technology
2016-04-01
|
Series: | Mehran University Research Journal of Engineering and Technology |
Subjects: | |
Online Access: | http://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdf |
_version_ | 1818176482829139968 |
---|---|
author | Mumtaz Qabulio Yasir Arfat Malkani Ayaz Ahmed Keerio |
author_facet | Mumtaz Qabulio Yasir Arfat Malkani Ayaz Ahmed Keerio |
author_sort | Mumtaz Qabulio |
collection | DOAJ |
description | WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs |
first_indexed | 2024-12-11T20:16:54Z |
format | Article |
id | doaj.art-397d3e7cd2644b35805070e7084d8c04 |
institution | Directory Open Access Journal |
issn | 0254-7821 2413-7219 |
language | English |
last_indexed | 2024-12-11T20:16:54Z |
publishDate | 2016-04-01 |
publisher | Mehran University of Engineering and Technology |
record_format | Article |
series | Mehran University Research Journal of Engineering and Technology |
spelling | doaj.art-397d3e7cd2644b35805070e7084d8c042022-12-22T00:52:10ZengMehran University of Engineering and TechnologyMehran University Research Journal of Engineering and Technology0254-78212413-72192016-04-01344413424On Node Replication Attack in Wireless Sensor NetworksMumtaz Qabulio0Yasir Arfat Malkani1Ayaz Ahmed Keerio 2Institute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanInstitute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanInstitute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanWSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNshttp://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdfWireless Sensor Networks SecurityNode ReplicationClone Node Attack |
spellingShingle | Mumtaz Qabulio Yasir Arfat Malkani Ayaz Ahmed Keerio On Node Replication Attack in Wireless Sensor Networks Mehran University Research Journal of Engineering and Technology Wireless Sensor Networks Security Node Replication Clone Node Attack |
title | On Node Replication Attack in Wireless Sensor Networks |
title_full | On Node Replication Attack in Wireless Sensor Networks |
title_fullStr | On Node Replication Attack in Wireless Sensor Networks |
title_full_unstemmed | On Node Replication Attack in Wireless Sensor Networks |
title_short | On Node Replication Attack in Wireless Sensor Networks |
title_sort | on node replication attack in wireless sensor networks |
topic | Wireless Sensor Networks Security Node Replication Clone Node Attack |
url | http://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdf |
work_keys_str_mv | AT mumtazqabulio onnodereplicationattackinwirelesssensornetworks AT yasirarfatmalkani onnodereplicationattackinwirelesssensornetworks AT ayazahmedkeerio onnodereplicationattackinwirelesssensornetworks |