On Node Replication Attack in Wireless Sensor Networks

WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy...

Full description

Bibliographic Details
Main Authors: Mumtaz Qabulio, Yasir Arfat Malkani, Ayaz Ahmed Keerio
Format: Article
Language:English
Published: Mehran University of Engineering and Technology 2016-04-01
Series:Mehran University Research Journal of Engineering and Technology
Subjects:
Online Access:http://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdf
_version_ 1818176482829139968
author Mumtaz Qabulio
Yasir Arfat Malkani
Ayaz Ahmed Keerio
author_facet Mumtaz Qabulio
Yasir Arfat Malkani
Ayaz Ahmed Keerio
author_sort Mumtaz Qabulio
collection DOAJ
description WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs
first_indexed 2024-12-11T20:16:54Z
format Article
id doaj.art-397d3e7cd2644b35805070e7084d8c04
institution Directory Open Access Journal
issn 0254-7821
2413-7219
language English
last_indexed 2024-12-11T20:16:54Z
publishDate 2016-04-01
publisher Mehran University of Engineering and Technology
record_format Article
series Mehran University Research Journal of Engineering and Technology
spelling doaj.art-397d3e7cd2644b35805070e7084d8c042022-12-22T00:52:10ZengMehran University of Engineering and TechnologyMehran University Research Journal of Engineering and Technology0254-78212413-72192016-04-01344413424On Node Replication Attack in Wireless Sensor NetworksMumtaz Qabulio0Yasir Arfat Malkani1Ayaz Ahmed Keerio 2Institute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanInstitute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanInstitute of Mathematics & Computer Science, University of Sindh, Jamshoro, PakistanWSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNshttp://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdfWireless Sensor Networks SecurityNode ReplicationClone Node Attack
spellingShingle Mumtaz Qabulio
Yasir Arfat Malkani
Ayaz Ahmed Keerio
On Node Replication Attack in Wireless Sensor Networks
Mehran University Research Journal of Engineering and Technology
Wireless Sensor Networks Security
Node Replication
Clone Node Attack
title On Node Replication Attack in Wireless Sensor Networks
title_full On Node Replication Attack in Wireless Sensor Networks
title_fullStr On Node Replication Attack in Wireless Sensor Networks
title_full_unstemmed On Node Replication Attack in Wireless Sensor Networks
title_short On Node Replication Attack in Wireless Sensor Networks
title_sort on node replication attack in wireless sensor networks
topic Wireless Sensor Networks Security
Node Replication
Clone Node Attack
url http://publications.muet.edu.pk/research_papers/pdf/pdf1150.pdf
work_keys_str_mv AT mumtazqabulio onnodereplicationattackinwirelesssensornetworks
AT yasirarfatmalkani onnodereplicationattackinwirelesssensornetworks
AT ayazahmedkeerio onnodereplicationattackinwirelesssensornetworks