Abstract

Wireless Sensor Networks (WSNs) are collection of large number of sensor nodes that are used for essential monitoring purposes. They include many applications such as military and security applications, elementary monitoring, seismic monitoring, industrialized automation, wellness and robust monitoring etc. Due to its distributed nature and interconnected network approach, they are considered common target among attackers. WSNs are unprotected due to many attacks like illegal access, malicious node attack, wormhole attack, jamming attack, insider attack, cloning attack, routing attack and node capturing attack etc. Node capturing attack leads to node replication attack which is considered dangerous because after capturing node, attacker may extract all the encrypted information and further introduce many insider attacks. In node replication attack, attacker tries to capture the sensor node and if he becomes successful then he generates the replica which appears to be genuine. This paper reviews the various types of identification schemes and protocols contrary to replication attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call