CFP last date
20 January 2025
Reseach Article

Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey

by J. Anthoniraj, T. Abdul Razak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 5
Year of Publication: 2014
Authors: J. Anthoniraj, T. Abdul Razak
10.5120/17183-7281

J. Anthoniraj, T. Abdul Razak . Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey. International Journal of Computer Applications. 98, 5 ( July 2014), 43-49. DOI=10.5120/17183-7281

@article{ 10.5120/17183-7281,
author = { J. Anthoniraj, T. Abdul Razak },
title = { Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 5 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number5/17183-7281/ },
doi = { 10.5120/17183-7281 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:27.691569+05:30
%A J. Anthoniraj
%A T. Abdul Razak
%T Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 5
%P 43-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Network (WSN) is a collection of autonomous sensor nodes which are low cost hardware components consists of sensor nodes with constraints on battery life, memory size and computation capabilities to monitor physical (or) environmental conditions. WSN is deployed in unattended and unsecure environments, so it is vulnerable to various types of attacks. One of the physical attacks is node replication attack (or) clone attack. An adversary can easily capture one node from the network and extract information from captured node. Then reprogram it to create a clone of a captured node. Then these clones can be deployed in all network areas, they can be considered as legitimate members of the network, so it is difficult to detect a replicated node. WSN can be either static (or) mobile, in that centralized and distributed clone attack detection methods are available. In this paper we analysis various centralized and distributed protocols in the static and mobile environments. We review these protocols and compare their performance with the help of witness selection, communication and memory overhead, detection probability of replicated nodes, resilience against adversary's node compromise.

References
  1. T. Bonact,P. Lee,L. Bushnell and R. Poovendra, "Distributed clone detection in wireless sensor networks: an optimization approach ",in Proceedings of the 2nd IEEE International Workshop on Data security and Privacy in Wireless Networks ,Lucca,Italy,June 2011.
  2. Yong Wang,Garhan Attebury and Byrav Ramamurthy "A survey of security networks issues in wireless sensor networks"IEEEcommunicationsSuveysandTutorials,vol. 8. no. 2,2006.
  3. Ian F. Akyildiz, William Su, Yogis S. Subramaniam and Real Cayirci, "A survey on sensor network", IEEE Communications Magazine, pp 102-114, August 2002.
  4. Cris Townsend, Stevan Arms, "Wireless sensor network: principles and applications", Chapter 22, pp439-449.
  5. Dr. G. Padmavathi, Mrs. D. Shanmuga Priya, "A Survey of attacks, security mechanisms and challenges in wireless sensor networks", International Journal of computer science and information security, vol. 4, no. 1&2, 2009.
  6. Prabhudutta Mohanty, Sangram Panigrahi, Nityananda Sarma and Siddhartha Sankar Satapathy, "Security issues in wireless sensor network data gathering protocols: A Survey", Journal of Theoretical and Applied Information Technology, pp14-29, 2005-2010.
  7. Mona Sharifnejad, Mohsen sharifi, Mansoureh Ghiasabadi and sureh Beheshti. "A Survey on Wireless Sensor Networks Security", Fourth International Conference: Sciences of Electronic Technologies of Information and Telecommunication, March 25-29, 2007
  8. Yan-Xiao Li, Lain-Qin, Ian-Liang, "Research on wireless Sensor network security", IEEE Computer Society, International Conference on Computational Intelligence and Security, 2010.
  9. Jun-Won Ho, Dogging Lin, Matthew Wright, SajaiK. Das "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks", Preprint submitted Elsevier, March 2009.
  10. Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang "Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks", IEEE Transactions on Mobile Computing, Vo1 9, No 7, Pages 913-926, July 2010
  11. Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, "Efficient Distributed Detection of Node Replication Attacks in sensor Networks",IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
  12. Hesiod Choy, Cancun Zhu and T. F. La Porta," SET: Detecting Node clones in Sensor Networks", Proc of 3rd International Conference on Security and Privacy in comm. . . Networks (Secure Comm) Pages 341-350, 2007
  13. Kai Xing,Fang Liu,Xiuzhen Cheng,David H. C. Du," Real-time Detection of clone attacks in Wireless Sensor Networks",IEEE ICDCS 2008
  14. C. Bekara and M. Laurent- Maknavicius,"A New Protocol for securing Wireless Sensor Networks against nodes replication attacks"Third IEEE International Conference on Security and Privacy in communication networks,2008
  15. C. M. Yu, C. S. Lu and S. Y. Kuo,"CSI: Compressed sensing based clone identification in sensor networks"in proceedings of the IEEE International conference on pervasive computing and communications workshops, pages 290-295, March-2012
  16. Bryan Parno, Adrian Perrig, Virgil Gligor, " Distributed Detection of Node Replication Attacks in Sensor Networks ", In proceeding of the IEEE Symposium on Security and Privacy , 2005
  17. Mauro Conti, Roberto Di Pieto, L. V. Mancini and A. Mei,"A Randomized and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks ", Proc. ACM MobiHoc, Pages 80-89, Sept 2007
  18. Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini and Alessandro Mei "Distributed Detection of Clone Attacks in Wireless Sensor Networks" IEEE Transactions on Dependable and Secure Computing, Vol 18, No 5, Pages 685-698, September/October 2011
  19. Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang "Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks", IEEE Transactions on Mobile Computing, Vo1 9, No 7, Pages 913-926, July 2010
  20. Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia , Sushil Jajodia and Sankaradas Roy,"Efficient Distributed Detection of Node Replication Attacks in sensor Networks",IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
  21. Ming Zhang, Vishal Khanapure, Shigang Chen,Xuelian Xiao, "Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Network" IEEE Pages 284-293, 2009
  22. Wassim Znaidi, Marine Minjer, Stephane Uheda,"Hierachical Node Replization Attacks Detection in Wireless Sensors networks "IEEE, Pages 82-86, 2009.
  23. Yingpei Zeng, Jiannong Cao, Shigeng Zhang,Shanqing Gao and Li Xie "Random Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks ", IEEE Journal on selected areas in communications, vol 28, No. 5 Pages 677-691, June 2010
  24. J. W. Ho,"Distributed detection of node capture attack inwireless sensor networks", in smart wireless sensor networks, pages 345-360, 2010
  25. Y. Lou,Y. Zhang and S,Liu,"Single hop detection of node clone attacks in mobile wireless sensor networks",in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE)2012.
  26. J. Ho, M. Wright and S. K. Das,"Fast Detection of Replica Node Attacks in mobile sensor networks using sequential analysis", Proc IEEE INFOCOM, Apr 2009
  27. Chia-Mu yu, Chun-shien Lu and Sy Yen Kuo,"Mobile Sensor Network Resilient I against Node Replication Attacks", IEEE, Pages 597-599, 2008
  28. Lee-Chun Ko, Hung-Yuan Chen, Guan-Rong Lin,"A Neighbor-Based Detection Scheme for Wireless Sensor Networks Against Node Replications Attacks",IEEE , 2009
  29. Chia-MuYu, Chun-ShienLu and Sy-Yen Kuo," Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks", IEEE, 2009
  30. Xiaoming Deng, Yan Xiong, Depin Chen,"Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks ", IEEE 6th international conference on Wireless and Mobile Computing, Networking and Communications, 2010
  31. Y. Lou,Y. Zhang and S,Liu,"Single hop detection of node clone attacks in mobile wireless sensor networks",in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE)2012.
  32. L. M. Wang and Y. Shi,"Patrol detection for replica attacks on wireless sensor networks", vol 11, pages 2496-2504, 2011.
  33. Wen Tao zhu, "Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme", International Conference on Network Computing and Information Security, Pages 156-160, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Security attack Base Station Clone attack Clone attack detection Centralized approach Distributed approach.