A Survey on Distributed Techniques for Detection of Node Clones in Wireless Sensor Networks

被引:0
|
作者
Autkar, Shriya V. [1 ]
Dhage, M. R. [1 ]
Bholane, S. P. [1 ]
机构
[1] Sinhgad Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
关键词
Distributed protocols; Node Clone attack; Security goals; Wireless Sensor Networks; Witness;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks consists of sensor nodes which are placed in harsh and hostile surrounding where an adversary may capture the nodes, replicate them and use it for its own purpose. If the clone nodes remain undetected, it can disrupt the network functions making it vulnerable to attacks. Hence false data can be injected or the legitimate data can be taken out. Thus to detect the node clone attack to preserve security goals is the fundamental problem in WSN. Centralized methods have been proposed to detect the clones which consist of single point of failure. Hence distributed protocols are more subtle to detect the clone nodes where no central authority is present and each node is responsible for detection. This paper presents various existing witness-based distributed techniques for detecting node clones present in the network.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Node Relocation Techniques for Wireless Sensor Networks: A Short Survey
    Ul Hassan, Mahmood
    Mahmood, Khalid
    Ali, Shahzad
    Al Awady, Amin
    Saeed, Muhammad Kashif
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 323 - 329
  • [2] Strategies and techniques for node placement in wireless sensor networks: A survey
    Younis, Mohamed
    Akkaya, Kemal
    AD HOC NETWORKS, 2008, 6 (04) : 621 - 655
  • [3] Node Replication Attack Detection in Distributed Wireless Sensor Networks
    Sujihelen, L.
    Boddu, Rajasekhar
    Murugaveni, S.
    Arnika, Ms
    Haldorai, Anandakumar
    Reddy, Pundru Chandra Shaker
    Feng, Suili
    Qin, Jiayin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Outlier Detection Techniques for Wireless Sensor Networks: A Survey
    Zhang, Yang
    Meratnia, Nirvana
    Havinga, Paul
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (02): : 159 - 170
  • [5] Distributed Combining Techniques for Distributed Detection in Fading Wireless Sensor Networks
    Aldalahmeh, Sami
    Al-Jazzar, Saleh O.
    McLernon, Des
    Zaidi, Syed Ali Raza
    Cardenas, Marco
    2019 2ND IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (IEEEMENACOMM'19), 2019, : 128 - 133
  • [6] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [7] Node Failure Handling for Serial Distributed Detection in Wireless Sensor Networks
    Imamoglu, Mumin
    Keskinoz, Mehmet
    2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2010, : 1894 - 1898
  • [8] Outlier Detection Techniques for Localization in Wireless Sensor Networks: A Survey
    Abukhalaf, Hala
    Wang, Jianxin
    Zhang, Shigeng
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 99 - 113
  • [9] Distributed Node Deployment Algorithms in Mobile Wireless Sensor Networks: Survey and Challenges
    Ghahroudi, Mahsa Sadeghi
    Shahrabi, Alireza
    Ghoreyshi, Seyed Mohammad
    Alfouzan, Faisal Abdulaziz
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (04)
  • [10] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364