International Conference in Recent trends in Computational Methods, Communication and Controls |
Foundation of Computer Science USA |
ICON3C - Number 7 |
April 2012 |
Authors: V. Ram Prabha, P. Latha |
54f573f8-3830-4701-b347-8fda767f48ee |
V. Ram Prabha, P. Latha . An Overview of Replica Node Detection in Wireless Sensor Networks. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 7 (April 2012), 19-22.
Wireless Sensor Networks deployed in hostile environment are vulnerable to many attacks due to the nature of deployment and poor physical security. An attacker can take control over the network by compromising few nodes in the network either by extracting the secret keys from the sensor node or reprogram the sensor nodes. After compromising the sensor nodes, making the replicas of them and placing them back to the network , an adversary may perform various types of attacks on the network . Replica node attack is a very hazardous one and must be detected as early as possible to protect the network from those attacks. Many schemes have been proposed for detecting the replica nodes in centralized and distributed environment. In this paper we review these schemes and comparing their performance.