An Exhaustive Survey on Physical Node Capture Attack in WSN

Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key information from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing modeling techniques of node capture attack in wireless sensor network. It also analyzes various detection and key predistribution schemes for inventing a new scheme to improve resilience against node capture attack..

[1]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[3]  Chi Lin,et al.  Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach , 2013, The Journal of Supercomputing.

[4]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[5]  T.D. Subash,et al.  Double hash function scheme in wireless sensor networks , 2011, 2011 World Congress on Information and Communication Technologies.

[6]  Feng Xia,et al.  Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set , 2013, Mobile Networks and Applications.

[7]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  Mohammad S. Obaidat,et al.  A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set , 2013, Secur. Commun. Networks.

[9]  Radha Poovendran,et al.  Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.

[10]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[11]  Klaus D. McDonald-Maier,et al.  Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics , 2012, 2012 Third International Conference on Emerging Security Technologies.

[12]  Sana Hoor Jokhio,et al.  Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[13]  L M Patnaik,et al.  Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks , 2011 .

[14]  Alekha Kumar Mishra,et al.  Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[15]  Mrudang Mehta,et al.  Security in Wireless Sensor Network: A survey , 2011 .

[16]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[17]  Rabi N. Mahapatra,et al.  Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[18]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[19]  Sajal K. Das,et al.  Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.

[20]  Sanjay Silakari,et al.  An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network , 2015 .

[21]  Luciano Lavagno,et al.  A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[22]  Jun-won Ho Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .