Detecting node replication attacks in wireless sensor networks: a survey

A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent a...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU, Wen Tao, Zhou, Jianying, DENG, Robert H., Bao, Feng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2012
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1633
http://dx.doi.org/10.1016/j.jnca.2012.01.002
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2632
record_format dspace
spelling sg-smu-ink.sis_research-26322013-01-10T07:09:08Z Detecting node replication attacks in wireless sensor networks: a survey ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research. 2012-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1633 info:doi/10.1016/j.jnca.2012.01.002 http://dx.doi.org/10.1016/j.jnca.2012.01.002 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Wireless sensor network Security Node replication attack Detection Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Wireless sensor network
Security
Node replication attack
Detection
Information Security
spellingShingle Wireless sensor network
Security
Node replication attack
Detection
Information Security
ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
Detecting node replication attacks in wireless sensor networks: a survey
description A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research.
format text
author ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
author_facet ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
author_sort ZHU, Wen Tao
title Detecting node replication attacks in wireless sensor networks: a survey
title_short Detecting node replication attacks in wireless sensor networks: a survey
title_full Detecting node replication attacks in wireless sensor networks: a survey
title_fullStr Detecting node replication attacks in wireless sensor networks: a survey
title_full_unstemmed Detecting node replication attacks in wireless sensor networks: a survey
title_sort detecting node replication attacks in wireless sensor networks: a survey
publisher Institutional Knowledge at Singapore Management University
publishDate 2012
url https://ink.library.smu.edu.sg/sis_research/1633
http://dx.doi.org/10.1016/j.jnca.2012.01.002
_version_ 1770571385135955968