Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The sensor networks are often deployed in hostile environments and are not attended for long time. Deployment of these networks is increased in the recent years, as they help in monitoring and analyzing different properties of the environment. The application of wireless sensor network starts from environment, household monitoring and ranging up to critical military applications. The sensor nodes in the network are prone to different kinds of novel attacks. An attacker, with little effort, may physically capture nodes, exploits the information on the node, reprogram the node and create replicas, and secretly insert these replicas at strategic locations within the network. This is called as node replication attack. Since these replicas have legitimate access to the network (legitimate IDs, keys, other security credentials, etc.), they can participate in the network operations in the same way as a legitimate node, and thus a large variety of insider attacks takes over the network. Using such nodes the attacker can corrupt the data flowing through the network, also the attacker can disconnect some part of the network with other part of the network. Detection of node replication attack is therefore important. So, in this report we will come to know about some node replication detection schemes, out of which some depend primarily on centralized mechanisms where the base station plays very important role, and others depend on distributed detection schemes. The detection probabilities and communication overhead are the major concern while proposing and using the detection techniques. Hence, the design of efficient algorithm to detect node identity replicas is still an open and demanding issue.

Authors and Affiliations

Mayur R. Khandekar , Prof. U. K. Raut

Keywords

Related Articles

 A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power  Consumption

 In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of  security threat...

Audio Denoising, Recognition and Retrieval by Using Feature Vectors

In this paper, we present the study of audio signal denoising, recognizing its audio type and retrieving similar signals from the database. Primarily the signal is denoised to remove any noise present in the,unknown sign...

 A Survey Paper on Steganalysis F5 Algorithm

 Steganography is a technique which used for securing the secret information from the illegal activity. Steganalysis is technique of finding the hidden text from the stego image. A Steganalysis based on the  ...

 Advanced Safe PIN-Entry Against Human Shoulder-Surfing

Abstract: When users insert their passwords in a common area, they might be at risk of aggressor stealingtheir password. The PIN entry can be perceived by close by adversaries, more effectually in a crowded place. Anew t...

Fault Discovery Probability Analysis for Software Reliability Estimation

Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...

Download PDF file
  • EP ID EP121690
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Mayur R. Khandekar, Prof. U. K. Raut (2014).  Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 65-70. https://europub.co.uk/articles/-A-121690