A STUDY OF CLONE DETECTING TECHNIQUES IN STATIONARY AND MOBILE WIRELESS SENSOR NETWORK R.Priyadharshni

Mobile Wireless sensor network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other without a need for fixed infrastructure. Sensor nodes are not equipped with tamper resistant hardware which arises many security challenges. Some of threats are clone attack, Wormhole attack, Sybil attack etc. The attack concentrated in this paper is Clone attack. Here, adversary subverts the network by just introducing replicas of previously compromised nodes. We have some traditional approaches to detect cloned nodes in stationary sensor nodes. The mobility of sensor nodes increases the challenges faced while detecting clone attacks. Recent research work leads to design of many protocols to detect clone in MWSN with low storage overhead, low computation overhead and increased probability of detection. This paper studies various techniques for detection of clones in mobile and stationary environment. It also summarizes various parameters to evaluate the detection probability of techniques discussed.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[3]  Fang Liu,et al.  Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[4]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[5]  Chun-Shien Lu,et al.  Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[7]  Roberto Di Pietro,et al.  Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[8]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[9]  M. Ansari,et al.  Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks , 2012 .

[10]  Shahzad Ali,et al.  Distributed efficient multi hop clustering protocol for mobile sensor networks , 2011, Int. Arab J. Inf. Technol..

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  P. Latha,et al.  An Overview of Replica Node Detection in Wireless Sensor Networks , 2012 .

[13]  M. Ramakrishnan,et al.  Detection of Clone Attacks in WSNs – A Survey , 2013 .

[14]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[15]  Roberto Di Pietro,et al.  Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..

[16]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[17]  S. Sharmila,et al.  Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network , 2012 .

[18]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[19]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[20]  Sushil Jajodia,et al.  Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).