Abstract

Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.

Highlights

  • A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that collaborate in order to achieve a common goal

  • Bloom filter and nonce are transferred to base station, which will count the number of times each key is used in the network

  • We believe that Sequential probability ratio test (SPRT) is well suited for tackling the mobile replica detection problem in the sense that we can construct a random walk with two limits in such a way that each walk is determined by the observed speed of a mobile node; the lower and upper limits are properly configured to be associated with the shortfall and excess of the maximum speed of the mobile node, respectively

Read more

Summary

INTRODUCTION

A Wireless Sensor Network (WSN) is a collection of sensors with limited resources that collaborate in order to achieve a common goal. In this paper we are concentrating on an identity attack called replication attack where one or more nodes illegitimately claim an identity of legitimate node and replicated in whole WSN network as shown Figure 1. Reason for choosing this attack is that it can form the basis of a variety attacks such as Sybil attack, routing attacks and link layer attacks etc. They are energy and memory demanding: A serious drawback for any protocol that is to be used in resource constrained environment such as a sensor network They are vulnerable to specific adversary models introduced in this paper.

SIGNIFICANCE OF REPLICATION ATTACK AND BACKGROUND
Sensor Network Environments
SOLUTIONS TO REPLICATION ATTACKS AND COUNTERMEASUREMENTS
Simple Approach
With the Context of Random Key Predistribution
Fast detection with SPRT for Mobile WSN
Distributed Detection Approaches
Node-to network Broadcasting
Witness Based strategy
With Deployment knowledge
Mobile WSN Distributed Detection approaches
Summary of Replication attack
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call