Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks

被引:0
作者
Khan, Wazir Zada [1 ]
Saad, Mohamad Naufal bin Mohamad [1 ]
Aalsalem, Mohammed Y. [2 ]
机构
[1] Univ Teknol PETRONAS, Elect & Elect Engn Dept, Tronoh 31750, Perak, Malaysia
[2] Jazan Univ, Sch Comp Sci, Jazan, Saudi Arabia
关键词
clone attack; node replication attack; mobile sensor network; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are often deployed in unattended environments where an adversary can easily physically capture and compromise sensor nodes. She then creates replicas of the compromised nodes instigating further attacks by spreading these replicas over the network, incurring serious damages to the network, so these replicas should be detected as early as possible. Most of the previous research efforts on detecting replica node attacks adopt static network models which are not suitable for mobile WSNs. In mobile WSN, sensor nodes are freely and randomly roaming all the time and they do not have any fixed neighbour to communicate with because these mobile nodes meet with one another occasionally and in an unpredictable manner. In this paper, we have surveyed all the existing solutions proposed so far for the detection of replica or clone nodes in mobile WSN by comparing them comprehensively and pointing out their drawbacks and shortcomings.
引用
收藏
页码:119 / 127
页数:9
相关论文
共 42 条
[21]   Protection on Wireless Sensor Network from Clone Attack using the SDN-Enabled Hybrid Clone Node Detection Mechanisms [J].
Devi, P. P. ;
Jaison, B. .
COMPUTER COMMUNICATIONS, 2020, 152 :316-322
[22]   Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack [J].
Alghamdi, Ahmed ;
Arozullah, Mohammed .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04) :8-18
[23]   Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks [J].
Kohno, Eitaro ;
Ohta, Tomoyuki ;
Kakuda, Yoshiaki ;
Aida, Masaki .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (01) :19-26
[24]   Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks [J].
Kim, BoSung ;
Song, JooSeok .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
[25]   Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks [J].
BoSung Kim ;
JooSeok Song .
EURASIP Journal on Wireless Communications and Networking, 2019
[26]   A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks [J].
邓晓明 ;
熊焰 .
Journal of Computer Science & Technology, 2011, (04) :732-743
[27]   A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks [J].
Xiao-Ming Deng ;
Yan Xiong .
Journal of Computer Science and Technology, 2011, 26 :732-743
[28]   Distributed Node Deployment Algorithms in Mobile Wireless Sensor Networks: Survey and Challenges [J].
Ghahroudi, Mahsa Sadeghi ;
Shahrabi, Alireza ;
Ghoreyshi, Seyed Mohammad ;
Alfouzan, Faisal Abdulaziz .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (04)
[29]   Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack [J].
Singh, Surinder ;
Saini, Hardeep Singh .
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, :190-193
[30]   Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary [J].
Reddy, Sasi Kiran V. L. ;
Ruj, Sushmita ;
Nayak, Amiya .
2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, :1836-1841