Node Replication Attacks in Mobile Wireless Sensor Network: A Survey

被引:13
作者
Shaukat, Haafizah Rameeza [1 ]
Hashim, Fazirulhisyam [1 ]
Sali, Aduwati [1 ]
Rasid, M. Fadlee Abdul [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Dept Comp & Commun Syst Engn, Serdang 43400, Selangor, Malaysia
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2014年
关键词
INJECTED FALSE DATA; DATA AGGREGATION; CLONE ATTACKS; AD HOC; AUTHENTICATION; LOCALIZATION; PROTOCOLS; SECURITY;
D O I
10.1155/2014/402541
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones. Owing to their operating nature, MWSNs are often unattended and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Keeping in view of the above, this paper places an emphasis on this aforementioned attack, known as node replication attack in MWSNs. Specifically, the current state-of-the-art of node replication attack in MWSNs is discussed, where this paper provides a detailed description of various existing detection and prevention mechanisms in literature with an aim to provide better understanding of the factors that need to be considered when designing defence mechanism of node replication attack. A detailed categorization of various detection techniques is provided in the paper with critical discussion on each categorization with respect to its advantages, disadvantages, and various constraints. To conclude the paper, a number of parameters are selected for comparison and analysis of all the existing detection schemes in the literature.
引用
收藏
页数:15
相关论文
共 59 条
[1]  
Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[4]  
Amundson I, 2009, LECT NOTES COMPUT SC, V5801, P235, DOI 10.1007/978-3-642-04385-7_16
[5]  
[Anonymous], 2003, P 1 ACM WORKSHOP SEC
[6]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[7]  
[Anonymous], 2005, P 4 ACM WORKSHOP WIR
[8]  
BALENSON D, 2000, 00016 NAI LABS TR
[9]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[10]  
Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278