Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks

被引:0
|
作者
Khan, Wazir Zada [1 ]
Saad, Mohamad Naufal bin Mohamad [1 ]
Aalsalem, Mohammed Y. [2 ]
机构
[1] Univ Teknol PETRONAS, Elect & Elect Engn Dept, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci, Jazan, Saudi Arabia
关键词
clone attack; node replication attack; mobile sensor network; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are often deployed in unattended environments where an adversary can easily physically capture and compromise sensor nodes. She then creates replicas of the compromised nodes instigating further attacks by spreading these replicas over the network, incurring serious damages to the network, so these replicas should be detected as early as possible. Most of the previous research efforts on detecting replica node attacks adopt static network models which are not suitable for mobile WSNs. In mobile WSN, sensor nodes are freely and randomly roaming all the time and they do not have any fixed neighbour to communicate with because these mobile nodes meet with one another occasionally and in an unpredictable manner. In this paper, we have surveyed all the existing solutions proposed so far for the detection of replica or clone nodes in mobile WSN by comparing them comprehensively and pointing out their drawbacks and shortcomings.
引用
收藏
页码:119 / 127
页数:9
相关论文
共 42 条
  • [1] Securing Mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 50 - 55
  • [2] Security Of Mobile Wireless Sensor Networks Against Node Replication Attack In Healthcare Applications
    Sindhuja, L. S.
    Beatrice, B. Anuja
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 102 - 109
  • [3] A Novel Algorithm for Detecting Node Clone Attack in Wireless Sensor Networks
    Patil, Deepali S.
    Patil, Shailaja C.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [4] Node authentication algorithm for securing static wireless sensor networks from node clone attack
    Mohindru V.
    Singh Y.
    International Journal of Information and Computer Security, 2018, 10 (2-3) : 129 - 148
  • [5] Detection of clone node attack in mobile wireless sensor network with optimised cost function
    Ansari, Mohammad Hassan
    Vakili, Vahid Tabataba
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 24 (03) : 149 - 159
  • [6] Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack
    Mohindru, Vandana
    Singh, Yashwant
    Bhatt, Ravindara
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2020, 13 (02) : 251 - 259
  • [7] Dynamic Detection of Clone Attack in Wireless Sensor Networks
    Sathish, R.
    Kumar, D. Rajesh
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 501 - 505
  • [8] A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks
    Numan, Muhammad
    Subhan, Fazli
    Khan, Wazir Zada
    Hakak, Saqib
    Haider, Sajjad
    Reddy, G. Thippa
    Jolfaei, Alireza
    Alazab, Mamoun
    IEEE ACCESS, 2020, 8 : 65450 - 65461
  • [9] Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    Yu, Yanli
    Li, Keqiu
    Zhou, Wanlei
    Li, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 867 - 880
  • [10] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +