Open Access Open Access  Restricted Access Subscription or Fee Access

Detection of Clone Attacks in WSNs – A Survey

C. Geetha, M. Ramakrishnan

Abstract


A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. One of the attacks is clone attack in which an adversary captures some nodes and replicates them including the cryptographic in formation and deploys them in the network. This attack is very dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several algorithms are developed to detect clone attacks, in static WSNs and mobile WSNs. Each one has its own advantages and disadvantages. This paper surveys these algorithms and compares their performance based on parameters like communication cost and memory.

Keywords


Attacks, Clone Attack, Sensor Network, Witness Node

Full Text:

PDF

References


Mauro Conti, Roberto Di Pietro , Luigi V. Mancini, and Alessandro Mei, ―Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN‖, IEEE International Conference on Systems, Man and Cybernetics, 2006, Taiwan.

D.Sheela , Srividhya .V.R, Vrushali , Amrithavarshini and Jayashubha J.‖A Mobile Agent Based Security System of Wireless Sensor Networks against Cloning and Sink Hole Attacks‖, ICCTAI'2012.

Mauro Conti, Roberto Di Pietro , Luigi Vincenzo Mancini, and Alessandro Mei, ―Distributed Detection of Clone Attacks in Wireless Sensor Networks‖, IEEE Transactions On Dependable And Secure Computing, VOL. 8, NO. 5, 2011.

Bryan Parno, Adrian Perrig, Virgil Gligor , ―Distributed Detection of Node Replication Attacks in Sensor Networks‖.

Wen TaoZhu, JianyingZhou, RobertH. Deng, FengBao , ―Detecting node replication attacks in wireless sensor networks: A survey‖, Journal of Network and Computer Applications 35 (2012) 1022–1034.

Dr. G. Padmavathi , D. Shanmugapriya ‖A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks ‖

International Journal of Computer Science and Information Security,Vol.4 No. 1&2,2009.

Jun-Won Ho, Matthew Wright, and Sajil K. Das ―Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis‖. IEEE Transactions on Mobile Computing June 2011 (vol. 10 no. 6) pp. 767-782

Kwantae Cho, Minbo Jo, Member , IEEE, Tackyoung Kwon, Hsiao - Hwa Chen, Fellow, IEEE ,and Dong Hoon Lee, Member, IEEE‖ Classification and Experimental Ana;ysis for Clone Detection Approaches in Wireless Sensor Networks‖ IEEE SYSTEM JOURNAL .

TEODOR-GRIGORE LUPU , Vasile Parvan 2,300223, Timisoara, ‖ Main Types of Attacks in Wireless Sensor Networks ‖ Recent Advances in Signals and Systems.

Kai Xing, Fang Liu Xiuzhen Cheng, David H. C .Du, ‖Real-time Detection of Clone Attacks in Wireless Sensor Networks‖ The 28th International Conference on Distributed Computing Systems.

V. Manjula, C. Chellappan ―Replication Attack Mitigation For Static And Mobile Wsn‖ International Journal; of Network Security&Its Application(IJNSA)Vol.3,No.2,March 2011.

Bryan Parno, Adrian Perrig, Virgil Gligor , ―Distributed Detection of Node Replication Attacks in Sensor Networks‖. Proceeding of 2005 IEEE Symposium on Security and Privacy Pages 49-63

Jun-Won Ho, Matthew Wright, Member, IEEE, and Sajil K. Das , Senior Member, IEEE,‖ Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing‖ IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.10, NO.6,June 2011.

V. Ram Prabha, P . Latha, ―An Overview of Replica Node Detection Wireless Sensor Networks‖ International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012) Proceedings Published in International Journal of Computer Applications (IJCA).

Jun- Won Ho, Member, IEEE Computer Society, Matthew Wright, Member, IEEE, and Sajal K. Das, Senior Member, IEEE‖ Zone-Trust :Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequentil Hypothesis Testing‖ IEEE TRANSACTIONS ON DEPENDABLE ANDSECURECOMPUTING,VOL.9,NO.4,JULY/AUGUST 2012.

Tamara Bonaci, Phillip Lee, Linda Bushnell, Radha Poovendran‖ A convex optimization approach for clone detection in wireless sensor networks‖ Contents List available at Elseivere Science Direct.

Jun-Won Ho, Matthew Wright, Donggang Liu, and Sajil K.Das ,‖ Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks ‖ Ad Hoc Networks 7(2009)-1476-1488.

Mauro Conti et al,‖ Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks‖ WiSec’08, March 31–April 2, 2008, Alexandria, Virginia, USA.

Chia-Mu Yu et al,‖ Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks‖ 2009 IEEE

Chia-Mu Yu et al,‖ Mobile Sensor Network Resilient against Node Replication Attacks‖ 2008 IEEE


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.