Detection Of Node Replication Attack

3434 Words14 Pages
Detection of Node Replication attack in Wireless Sensor Networks: A Review Ms. L S Sindhuja1, Dr. G Padmavathi2 1Research Scholar, Department of Computer Science Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore, India 2Professor and Head, Department of Computer Science Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore, India sindhujakarthick2011@gmail.com Abstract Wireless Sensor Network Security is one of the top design criteria specifically for applications such as large scale military, robotics and so on. Since the deployment of Wireless Sensor Networks is in hostile environments it is vulnerable to many types of attacks. Node Replication…show more content…
Authentication is a difficult task as the detection of replicated nodes is a crucial task. The sensor nodes are not tamper- resistant. The various detection methods are produced based on the mobility models and the network assumptions. Due to the resource constrained nature of the sensor nodes the detection methods encountered have following limitations. The paper presents the classification of various detection methods. Based on the mobility model also the detection methods have been classified which has been discussed in this paper. From the discussion it is found that Efficient Distributed Detection method suits well for detecting replicated nodes in the Wireless Sensor Networks. The paper organization is as follows: at first the network assumptions have been discussed. Following that various detection methods are classified and described briefly. 2. Network Assumptions The detection methods are proposed mainly based on the network assumptions. The network assumptions which are commonly assumed are as follows: • The communication is static. • Based on the location and the ID the replicated nodes are detected. • The sensor nodes are uniformly deployed. • The nodes are deterministic except for Random Walk based approach. • There is no simultaneous communication and also collaboration between the sensor nodes. • Identity based public key system is utilized by the network. 3. Various
Open Document