Detecting node replication attacks in wireless sensor networks: a survey
Publication Type
Journal Article
Publication Date
2012
Abstract
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research.
Keywords
Wireless sensor network, Security, Node replication attack, Detection
Discipline
Information Security
Research Areas
Information Security and Trust
Publication
Journal of Network and Computer Applications
Volume
35
Issue
3
First Page
1022
Last Page
1034
ISSN
1084-8045
Identifier
10.1016/j.jnca.2012.01.002
Publisher
Elsevier
Citation
ZHU, Wen Tao; Zhou, Jianying; DENG, Robert H.; and Bao, Feng.
Detecting node replication attacks in wireless sensor networks: a survey. (2012). Journal of Network and Computer Applications. 35, (3), 1022-1034.
Available at: https://ink.library.smu.edu.sg/sis_research/1633
Additional URL
http://dx.doi.org/10.1016/j.jnca.2012.01.002