Open Access Open Access  Restricted Access Subscription or Fee Access

Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing

M.N. Divakar, C.K. Raju, Siddappa Siddappa


Replica attack is a critical concern in the security of wireless sensor networks. Wireless sensor networks are known to be vulnerable to a variety of attacks that could undermine normal sensor network operations. Unattended nature of wireless sensor networks leads to mobile replica node attack. An adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Previous works on replica detection rely on fixed sensor locations and hence do not work in mobile sensor networks. The proposed work is a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. This paper works are designed for rooting out the sources of possible threats by quickly detecting and removing compromised nodes and preventing wide-spread node compromise through replica node and worm propagation attacks.


Wireless Sensor Networks, Sequential Probability Ratio, Replica Attacks, Localization.

Full Text:



Capkun, S. &Hubaux, J.P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):221-232, February 2006

Chan, H., Perrig, A., & Song, D. (2006). Secure hierarchical in-network aggregation in sensor networks . In ACM CCS, pages:278-287, October 2006.

Conti, M., Pietro, R., Mancini, L., & Mei, A. (2008). Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. In ACM WiSec, April 2008

H. Choi, S. Zhu, and T.F La Porta. SET: Detecting node clones in Sensor Networks. In IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2007.

S. ˇCapkun and J.P. Hubaux. Secure Positioning in Wireless Networks.

IEEE Journal on Selected Areas in Communications, 24(2):221–232, February 2006

Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks.Proceedings of IEEE S&P; Oakland, CA, USA. 8–11 May 2005; pp. 49–63.

Ho JW, Wright M, Das SK. Fast detection of replica node attacks in mobile sensor networksusing sequential analysis. Proceedings of IEEE INFOCOM; Rio de Janeiro, Brazil. 19–25 April 2009; pp. 1773–1781.

Parno, B., Luk, M., Gaustad, E., and Perrig, A. (2006). Secure sensor network routing: a cleanslate approach. In ACM CoNEXT, December 2006.

Du, X. & Xiao, Y. (2008). Chapter 17: A survey on sensor network security Springer Wireless Sensor Networks and Applications, 2008 .


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.