Académique Documents
Professionnel Documents
Culture Documents
Abstract- This paper presents a broad study on the Authenticated as honest nodes in a key establishment
finding of replication node in wireless sensor scheme of WSNs in different locations, eventually
networks. Consider a very simple and vital physical taking over a local sector or an entire network to launch
dose on WSN which is called node replication attack various attacks, such as corrupting data aggregation,
or clone attack. It is also recognized as injecting false data, and reducing packets selectively.
distinctiveness attack. Some algorithms are Thus, it is essential to detect clone nodes promptly for
established to detect clone attacks; in static WSNs minimizing their damages to WSNs.
and mobile WSNs. Everyone has its own advantages The simplest apologetic measure against
and disadvantages. This paper surveys these the clone attacks is to prevent an adversary from
algorithms and compares their performance based
extracting secret key materials from captured nodes by
on parameters.
benefit of tamper-resistant hardware. However, the
Index Terms - wireless sensor networks, Clone
hardware-based defensive measures are too expensive
attacks, Witness Node
to be concrete for resource-restricted sensor nodes.
I. INTRODUCTION Various kinds of software-based clone detection
schemes have recently been offered for WSNs,
Wireless sensor networks (WSNs), and particularly considering many different types of network
their security issues, have received great attention configuration, such as device types and deployment
recently in both academia and industry. Since tiny strategies. The restriction of software based clone
sensor nodes in WSNs have meagre resources for detection schemes is undoubtedly that they are not
computation, communication, power, and storage, it is generic, meaning that their performance and success
inspiring to provide efficient security functions and may depend upon their preconfigured network settings.
mechanisms for WSNs. Above all, since WSNs are The selection criteria of clone detection schemes with
frequently deployed in aggressive environments, sensor favour to device types, detection methodologies,
nodes can be captured and compromised easily by an deployment strategies and detection ranges, and then
adversary who may extract secret data from the classifies the existing schemes according to the
captured nodes. After such a compromise, a clone proposed criteria
attack can be launched by duplicating the captured
II. BACKGROUND
nodes and injecting them sporadically over the
networks such that the adversary can enlarge the
NODE REPLICATION ATTACK
bargained areas by employing the clones. The secret
information, such as access keys, extracted from the Wireless sensor network, an adversary mostly actually
captured nodes and still contained in clones, may allow captures only one or few of legitimate nodes, then
the challenger to gain access to communication systems clones or copies them fabricating those duplications
throughout WSNs. For instance, clones would be having the same identity (ID) with the captured node,
and finally
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY
Proceedings of
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND ENERGY SYSTEMS
(ICCCES-16)
In Association with IET, UK & Sponsored by TEQIP-II
29th -30th, Jan. 2016
Detection Techniques
In the total working schematic, a taxonomy of
clone detection schemes of WSNs, in which the
selection criteria is defined. Mainly, we split the
taxonomy according to device types, such as static
and mobile WSNs.
There are four main steps
1) Define selection criteria
2) Compare all clone Detection Schemes
(SCRW, SDRW, SDGW, SDGL,
MCW & MDW)
3) Clone Detection Schemes
4) Simulation Parameter testing
& graph Selection criteria
In the total working schematic, a
taxonomy of clone detection schemes of WSNs, in
which the selection criteria is defined. Mainly, we
split the taxonomy according to device types, such
as static and mobile WSNs. In Fig. 1, the clone Fig.1. Classifications of WSNs detection procedures
detection schemes of static WSNs are classified
into four types-
A. SCRW (static, centralized, random IV. Detection Techniques for Stationary Wireless
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY
Proceedings of
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND ENERGY SYSTEMS
(ICCCES-16)
In Association with IET, UK & Sponsored by TEQIP-II
29th -30th, Jan. 2016
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY
Proceedings of
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND ENERGY SYSTEMS
(ICCCES-16)
In Association with IET, UK & Sponsored by TEQIP-II
29th -30th, Jan. 2016
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY
Proceedings of
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND ENERGY SYSTEMS
(ICCCES-16)
In Association with IET, UK & Sponsored by TEQIP-II
29th -30th, Jan. 2016
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY
Proceedings of
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND ENERGY SYSTEMS
(ICCCES-16)
In Association with IET, UK & Sponsored by TEQIP-II
29th -30th, Jan. 2016
K.E. Society's
RAJARAMBAPU INSTITUTE OF TECHNOLOGY