CFP last date
20 January 2025
Reseach Article

A Survey on Detection of Clones in Wireless Sensor Networks

by Akhila Daniel, Preeja. V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 7
Year of Publication: 2014
Authors: Akhila Daniel, Preeja. V
10.5120/15897-5138

Akhila Daniel, Preeja. V . A Survey on Detection of Clones in Wireless Sensor Networks. International Journal of Computer Applications. 91, 7 ( April 2014), 48-52. DOI=10.5120/15897-5138

@article{ 10.5120/15897-5138,
author = { Akhila Daniel, Preeja. V },
title = { A Survey on Detection of Clones in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 7 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 48-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number7/15897-5138/ },
doi = { 10.5120/15897-5138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:05.080260+05:30
%A Akhila Daniel
%A Preeja. V
%T A Survey on Detection of Clones in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 7
%P 48-52
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days wireless sensor networks (WSN) have wide applications in variety of fields such as military purposes, environmental monitoring, and gathering sensing information in inhospitable locations. But with the increase in use of wireless sensor network the risk of data leakage also increased. The adversary can launch different types of attacks to the network which may subvert the overall functioning of the network. Sometimes the attacker captures some nodes from the network and their credentials will be collected. Some clones of the captured nodes will be created with same credentials and they will be deployed to the network. These nodes act as eavesdroppers of the network data and they will exploit all the privileges of the original captured nodes. So these clones should be detected before they can do much harm to the network. Several algorithms are developed for this purpose. Here a study is carried out on the various novel techniques introduced to detect replicas in wireless sensor networks and their efficiency and performances are analyzed.

References
  1. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, 2007, "On the detection of clones in sensor networks using random key predistribution". , IEEE Trans. Syst. , Man, Cybern. C, Applicat. Rev. , vol. 37, no. 6, pp. 1246–125.
  2. J. Ho,M. Wright, and S. K. Das. 2009, "Fast detection of replica node attacks in mobile sensor networks using sequential analysis,". in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Brazil,, pp. 1773–1781.
  3. M. Zhang, V. Khanapure, S. Chen, and X. Xiao. 2009 "Memory efficient protocols for detecting node replication attacks in wireless sensor networks," in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, pp. 284–293.
  4. Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie. 2010 "Random-walk based approach to detect clone attacks in wireless sensor networks",IEEE J. Sel. Areas Commun. , vol. 28, no. 5, pp. 677–691,
  5. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang. 2010, "Localized multicast: Efficient and distributed replica detection in large-scale sensor networks",IEEE Trans. Mobile Comput. , vol. 9, no. 7, pp. 913–926.
  6. M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei. 2011 "Distributed detection of clone attacks in wireless sensor networks", IEEE Trans. Depend. Secure Comput. , vol. 8, no. 5, pp. 685–698.
  7. Huang Jian1, Xiong Yan1+, Li Ming-xi1, Miao Fu you2. 2012 "A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks", International Conference on Information and Computer Networks (ICICN).
  8. Manjula and C. Chellappan. 2012",Trust based node replication attack detection protocol for wireless sensor networks"(2012), Journal of Computer Science , 8 (11), 1880-1888, ISSN 1549-3636
  9. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Member, IEEE, and Sy-Yen Kuo. Fellow,IEEE. 2013"Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks", IEEE transactions on information forensics and security.
  10. Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong," security in wireless sensor networks: issues and challenges".
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks (WSN) Clones Node replication Replicas