Abstract
The development of the wireless sensor networks technology commonly named WSNs has been gaining a significantly increased amount of attention from researchers over the last few decades. Its large number of sensor nodes is one of the features that makes it beneficial to the technology. The sensors can communicate with each other to form a network. These sensor nodes are generally used for diverse applications, such as pressure monitoring, fire detection, target tracking, and health monitoring, etc. However, the downside is that WSNs are often deployed in hostile, critical environments where they do not restrain physical access. This reality makes them incredibly vulnerable to clone node attacks or node replication attacks. The adversary can capture the legitimate sensor nodes, extract them and then collect some sensitive information, such as node ID, keys and perform a replication attack. This possibility will afterward facilitate the attacker to be able to take control of the whole network and execute the same functions as that of the authorized nodes. Based on this vulnerability, it is of great importance for researchers to invent a detection protocol for the clone attacks as well as a mitigation method. From all of the researches that have been published, a lot of them proposed some techniques to detect the clone node attacks and also to mitigate the attacks. However, almost none of them semantically focused on the security layer establishment. Based on this fact, we proposed an ontology-based approach Ontology for Replication Attacks in Static Wireless Sensor Networks “ORASWSN”, which can semantically be used for the detection and mitigation of the attacks by taking into consideration the importance of using security layers.
Highlights
A wireless sensor network (WSN) is an assemblage of sensor nodes with powerful potentialities
We propose an ontology scheme that will serve as good support for the static WSNs detection and mitigation techniques for the clone node attacks
The goal of this paper is to discuss the detection of clone node attacks in static wireless sensor networks (WSNs)
Summary
A wireless sensor network (WSN) is an assemblage of sensor nodes with powerful potentialities. The main tasks of the sensor nodes are to sense and monitor the area in which they are deployed, to gather sensor information from the environment, process data, and communicate with other nodes. Sensor nodes are considered to be one of the three main following components that WSN consists of in the installation configuration, which are: (1) sensor nodes, (2) wireless co-ordinator, and (3) any programmable logic controller (PLC) or any human–machine interface (HMI) supporting a remote terminal unit (RTU). The sensor nodes can become faulty and unreliable at any time because they are exposed to the Internet and are often open to physical access. The fact that sensor nodes data are exposed to the Internet makes them vulnerable to various types of attacks, such as distributed denial-of-service (DDoS) attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.