Abstract
Wireless sensor networks (WSN) are susceptible to various kinds of attack, and node replication attack is one of them. It is considered to be one of the most serious attacks in WSN. In this type of attack, an adversary deploys clones of a legitimate node. These clones participate in all network activities and behave identically same as the legitimate node. Therefore, detection of clones in the network is a challenging task. Most of the work reported in the literature for clone detection is location dependent. In this paper, we have proposed a location independent zone-based node replica detection technique. In the proposed scheme, the network is dynamically divided into a number of zones. Each zone has a zone-leader, and they share their membership list among themselves. It is the responsibility of the zone-leader to detect the clone. The proposed technique is a deterministic one. We have compared our scheme with LSM, RED, and P-MPC and observed that it has a higher clone detection probability and a lower communication cost.
Similar content being viewed by others
References
Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communication 40(8): 102–114
Boulis A. (2009) Castalia: A simulator for wireless sensor networks and body area networks. National ICT Australia Ltd, Australia
Choi, H., Zhu, S., & Porta, T. F. L. (2007). Set: Detecting node clones in sensor networks. In Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007, IEEE, Nice, France, pp. 341–350.
Chong C. Y., Kumar S. P. (2003) Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91(8): 1247–1256
Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA international conference on cryptography and coding(pp. 360–363). London, UK: Springer.
Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in wsn. In IEEE international conference on systems, man and cybernetics, SMC ’06 (pp. 1468–1473). Taipei: IEEE.
Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2007). A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, MobiHoc ’07 (pp. 80–89). Montreal, Canada: ACM.
Ho J. W., Liu D., Wright M., Das S. K. (2009) Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476–1488
Karlof C., Wagner D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1(2 and 3): 293–315
Ko, L. C., Chen, H. Y., & Lin, G. R. (2009). A neighbor-based detection scheme for wireless sensor networks against node replication attacks. In Proceedings of international conference on ultra modern telecommunications and workshops, ICUMT ’09 (pp. 1–6). St. Petersburg: IEEE.
Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63). IEEE.
Perrig A., Stankovic J., Wagner D. (2004) Secuirty in wireless sensor networks. Communications of the ACM 47(6): 53–57
Sarma, H. K. D., & Kar, A. (2006). Security threats in wireless sensor networks. In Proceedings 40th of annual IEEE international carnahan conferences security technology (pp. 243–251). Lexington, KY: IEEE.
Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. In Proceedings of the 4th annual international conference on wireless internet, WICON ’08 (pp. 01–08). Brussels, Belgium: ICST.
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84 on advances in cryptology (pp. 01–04). New York, USA: Springer.
Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habit monitoring application. In Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 214–226). Baltimore, USA: ACM.
Varga, A., & Hornig, R. (2008). An overview of the omnet++ simulation environment. In Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems and workshops, Simutools’08 (pp. 01–10). Brussels, Belgium: ICST.
Wang Y., Attebury G., Ramamurthy B. (2006) A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 8(2): 02–23
Zhang, M., Khanapure, V., Chen, S., & Xiao, X. (2009). Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of 17th IEEE international conference on network protocols, ICNP’09 (pp. 284–293). Princeton, NJ: IEEE.
Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., & Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of computer security applications conference, ACSAC 2007 (pp. 257–267). Miami Beach, FL: IEEE.
Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor and mobile radio communications, 09 (pp. 82–86). Tokyo: IEEE.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mishra, A.K., Turuk, A.K. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks. Wireless Pers Commun 69, 601–621 (2013). https://doi.org/10.1007/s11277-012-0592-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0592-8