Skip to main content
Log in

A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSN) are susceptible to various kinds of attack, and node replication attack is one of them. It is considered to be one of the most serious attacks in WSN. In this type of attack, an adversary deploys clones of a legitimate node. These clones participate in all network activities and behave identically same as the legitimate node. Therefore, detection of clones in the network is a challenging task. Most of the work reported in the literature for clone detection is location dependent. In this paper, we have proposed a location independent zone-based node replica detection technique. In the proposed scheme, the network is dynamically divided into a number of zones. Each zone has a zone-leader, and they share their membership list among themselves. It is the responsibility of the zone-leader to detect the clone. The proposed technique is a deterministic one. We have compared our scheme with LSM, RED, and P-MPC and observed that it has a higher clone detection probability and a lower communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communication 40(8): 102–114

    Article  Google Scholar 

  2. Boulis A. (2009) Castalia: A simulator for wireless sensor networks and body area networks. National ICT Australia Ltd, Australia

    Google Scholar 

  3. Choi, H., Zhu, S., & Porta, T. F. L. (2007). Set: Detecting node clones in sensor networks. In Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007, IEEE, Nice, France, pp. 341–350.

  4. Chong C. Y., Kumar S. P. (2003) Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91(8): 1247–1256

    Article  Google Scholar 

  5. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA international conference on cryptography and coding(pp. 360–363). London, UK: Springer.

  6. Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in wsn. In IEEE international conference on systems, man and cybernetics, SMC ’06 (pp. 1468–1473). Taipei: IEEE.

  7. Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2007). A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, MobiHoc ’07 (pp. 80–89). Montreal, Canada: ACM.

  8. Ho J. W., Liu D., Wright M., Das S. K. (2009) Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476–1488

    Article  Google Scholar 

  9. Karlof C., Wagner D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1(2 and 3): 293–315

    Article  Google Scholar 

  10. Ko, L. C., Chen, H. Y., & Lin, G. R. (2009). A neighbor-based detection scheme for wireless sensor networks against node replication attacks. In Proceedings of international conference on ultra modern telecommunications and workshops, ICUMT ’09 (pp. 1–6). St. Petersburg: IEEE.

  11. Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63). IEEE.

  12. Perrig A., Stankovic J., Wagner D. (2004) Secuirty in wireless sensor networks. Communications of the ACM 47(6): 53–57

    Article  Google Scholar 

  13. Sarma, H. K. D., & Kar, A. (2006). Security threats in wireless sensor networks. In Proceedings 40th of annual IEEE international carnahan conferences security technology (pp. 243–251). Lexington, KY: IEEE.

  14. Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. In Proceedings of the 4th annual international conference on wireless internet, WICON ’08 (pp. 01–08). Brussels, Belgium: ICST.

  15. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84 on advances in cryptology (pp. 01–04). New York, USA: Springer.

  16. Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habit monitoring application. In Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 214–226). Baltimore, USA: ACM.

  17. Varga, A., & Hornig, R. (2008). An overview of the omnet++ simulation environment. In Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems and workshops, Simutools’08 (pp. 01–10). Brussels, Belgium: ICST.

  18. Wang Y., Attebury G., Ramamurthy B. (2006) A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 8(2): 02–23

    Article  Google Scholar 

  19. Zhang, M., Khanapure, V., Chen, S., & Xiao, X. (2009). Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of 17th IEEE international conference on network protocols, ICNP’09 (pp. 284–293). Princeton, NJ: IEEE.

  20. Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., & Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of computer security applications conference, ACSAC 2007 (pp. 257–267). Miami Beach, FL: IEEE.

  21. Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor and mobile radio communications, 09 (pp. 82–86). Tokyo: IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Kumar Turuk.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mishra, A.K., Turuk, A.K. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks. Wireless Pers Commun 69, 601–621 (2013). https://doi.org/10.1007/s11277-012-0592-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0592-8

Keywords

Navigation