Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks

Wireless sensor networks are often deployed in adverse environments where an attackers can physically capture some of the nodes, first can reconstruct the programme, and then, can replicate them in large number of clones, easily takeover the control of network. Wireless Sensor Networks highly indispensable for securing network protection. Various kinds of major attacks have been documented in wireless sensor network, till now by many researchers. The Clone attack is a massive harmful attack against the sensor network where large number of genuine replicas are used for illegal entry into a network. Discerning the Clone attack, Sybil attack, sinkhole, and wormhole attack while multicasting is a excellent job in the wireless sensor network. The existing method Randomised, Efficient, and Distributed (RED) has only a scheme of self-healing mechanism, which just verifies the node identities by analyzing the neighbours. A survey was done on a Clone attack on the objective of dissolving this problem. The overview of survey has proposed a combined PVM (position verification method) with MVP (Message Verification and Passing) for detecting, eliminating, and eventually preventing the entry of Clone nodes within the network.

[1]  Zhang Yu-sen,et al.  Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack , 2011 .

[2]  D. Llewellyn-Jones,et al.  Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks , 2009, 2009 Second International Conference on Developments in eSystems Engineering.

[3]  Liang Chang,et al.  Context-Aware Service Ranking in Wireless Sensor Networks , 2012, Journal of Network and Systems Management.

[4]  Cem Ersoy,et al.  Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths , 2012, Comput. Commun..

[5]  George Kesidis,et al.  Managing sybil identities in distributed networks , 2010 .

[6]  R. S. Bhuvaneswaran,et al.  DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .

[7]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[8]  S. Sharmila,et al.  Node ID based detection of Sybil attack in mobile wireless sensor network , 2013 .

[9]  Roberto Di Pietro,et al.  Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[10]  Norafida Ithnin,et al.  Secure Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey Analysis , 2012 .

[11]  Manu Sood,et al.  SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK , 2012 .

[12]  L. Zhou,et al.  Lightweight and effective detection scheme for node clone attack in wireless sensor networks , 2011, IET Wirel. Sens. Syst..

[13]  D. Anand,et al.  SECURITY THREATS & ISSUES IN WIRELESS SENSOR NETWORKS , 2022 .

[14]  Raja Sharmi Raja Husin,et al.  Optimization of Circular Side Door Beam for Crashworthiness Analysis , 2012 .

[15]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[16]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[17]  Sugata Sanyal,et al.  A Review of Techniques to Mitigate Sybil Attacks , 2012, ArXiv.

[18]  Zubair A. Baig Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..

[19]  Yogendra Kumar,et al.  Security in Wireless Sensor Network: A Survey , 2013 .

[20]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Rajamani Vayanaperumal,et al.  Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.

[22]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[23]  Yusheng Ji,et al.  An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[24]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.