Abstract

Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, wireless sensor networks (WSNs) are prone to a wide variety of physical attacks. In this paper, we deem a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes. To instigate this attack, an adversary only needs to physically capture one node, and after collecting all secret credentials (ID, cryptographic keys, etc.), an adversary replicates the sensor node and deploys one or more clones of the compromised node into the network at strategic positions, damaging the whole network by carrying out many internal attacks. Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. In this survey, we have classified the existing detection schemes and comprehensively explore various proposals in each category. We will also take a glance at some technical details and comparisons so as to demonstrate limitations of the existent detections as well as effective contributions.

Highlights

  • Advancement in technology has made it possible to develop tiny low-cost sensor nodes with off-the-shelf hardware

  • For the performance analysis and evaluation of replica detection protocols, four vital evaluation metrics are mostly used by all the detection schemes

  • Communication overhead is defined as the average number of messages sent by a sensor node while propagating the location claims

Read more

Summary

Introduction

Advancement in technology has made it possible to develop tiny low-cost sensor nodes with off-the-shelf hardware. A wireless sensor network (WSN), which is a distributed and self-organized network, is a collection of such sensor nodes with limited resources that collaborate in order to achieve a common goal. These sensor nodes are comprised of lowcost hardware components with constraints on battery life, memory size, and computation capabilities [1]. Wireless sensor networks are often deployed in harsh and hostile environments which are inaccessible and even hazardous areas to perform various monitoring tasks. They can be used to monitor factory instrumentation, pollution levels, freeway traffic, and the structural integrity of buildings [2]. Some of the other applications of WSNs include patient monitoring, climate sensing, control in office buildings, and home environmental sensing systems for temperature light, moisture, and motion

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call