Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSNs) are composed of a number of resource-constrained sensor nodes which are often deployed in unattended environments. Therefore, WSNs easily encounter a variety of physical attacks.In this paper, we focus on one of physical attacks known as node replication attack, where an intruder randomly captures a legitimate sensor node, and collects all secret element. Then an intruder inserts the secret element in his malicious sensor nodes and deploys the malicious sensor nodes into the network. An intruder can use malicious nodes eavesdrop on the communication of other sensors, or inject false data reports that make a server misjudge. In recent years, detecting node replication attack is an important task in sensor network area.In our survey, we analyze previous research and demonstrate contributions of the existent literatures.

[1]  Jean Frédéric Myoupo,et al.  Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure , 2013, Int. J. Netw. Secur..

[2]  Aziz Mohaisen,et al.  Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks , 2009, Int. J. Netw. Secur..

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Yen-Ping Chu,et al.  An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[7]  Liang-Min Wang,et al.  Node-failure Tolerance of Topology in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..

[8]  Jyoteesh Malhotra,et al.  Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[9]  Mohammed Feham,et al.  Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks , 2014, Int. J. Netw. Secur..

[10]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[11]  Ashok K. Turuk,et al.  A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[12]  Niki Pissinou,et al.  Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..

[13]  Jianxin Wang,et al.  Robust two-factor authentication and key agreement preserving user privacy , 2014 .

[14]  Ashok Kumar Das An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..

[15]  R. B. Patel,et al.  A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks , 2013, Int. J. Netw. Secur..

[16]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[17]  Jun-won Ho Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .

[18]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[19]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[20]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[21]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[22]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[23]  Jianxin Wang,et al.  A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks , 2014, Int. J. Netw. Secur..

[24]  Chun-Ta Li,et al.  Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..

[25]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[26]  Falko Dressler Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..

[27]  Yang Xiang,et al.  Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[28]  B. Sathish Babu,et al.  Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..

[29]  Afrand Agah,et al.  A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..

[30]  Hamdy S. Soliman,et al.  Application of synchronous dynamic encryption system (SDES) in wireless sensor networks , 2005, PE-WASUN '05.

[31]  Soumya Sara Koshy,et al.  Zone Based Node Replica Detection in Wireless Sensor Network Using Trust , 2013 .

[32]  Dulal Kar,et al.  MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks , 2013, Int. J. Netw. Secur..

[33]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[34]  Ashok Kumar Das Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks , 2012, Int. J. Netw. Secur..

[35]  Chun-Ta Li,et al.  A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..

[36]  Guang Gong,et al.  Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[37]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[38]  Jayaprakash Kar,et al.  Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network , 2014, Int. J. Netw. Secur..