GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Sensor node compromise detection: the location perspective
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
IEEE Transactions on Mobile Computing
Efficient online/offline identity-based signature for wireless sensor network
International Journal of Information Security
Non-cryptographic authentication and identification in wireless networks
IEEE Wireless Communications
Exploiting the physical layer for enhanced security
IEEE Wireless Communications
An efficient location-based compromise-tolerant key management scheme for sensor networks
Information Processing Letters
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme
NCIS '11 Proceedings of the 2011 International Conference on Network Computing and Information Security - Volume 02
Distributed Detection of Clone Attacks in Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Security of emergent properties in ad-hoc networks (transcript of discussion)
SP'04 Proceedings of the 12th international conference on Security Protocols
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
IEEE Wireless Communications
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Detecting node replication attacks in mobile sensor networks: theory and approaches
Security and Communication Networks
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing
A defense against clock skew replication attacks in wireless sensor networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research.