Detection Of Node Replication Attack
Detection of Node Replication attack in Wireless Sensor Networks: A Review
Ms. L S Sindhuja1, Dr. G Padmavathi2
1Research Scholar, Department of Computer Science
Avinashilingam Institute for Home Science and Higher Education for Women University,
Coimbatore, India
2Professor and Head, Department of Computer Science
Avinashilingam Institute for Home Science and Higher Education for Women University,
Coimbatore, India
[email protected] Abstract
Wireless Sensor Network Security is one of the top design criteria specifically for applications
such as large scale military, robotics and so on. Since the deployment of Wireless Sensor Networks
is in hostile environments it is vulnerable to many types of attacks. Node Replication ... Show more
content on Helpwriting.net ...
Authentication is a difficult task as the detection of replicated nodes is a crucial task. The sensor
nodes are not tamper resistant.
The various detection methods are produced based on the mobility models and the network
assumptions. Due to the resource constrained nature of the sensor nodes the detection methods
encountered have following limitations. The paper presents the classification of various detection
methods. Based on the mobility model also the detection methods have been classified which has
been discussed in this paper. From the discussion it is found that Efficient Distributed Detection
method suits well for detecting replicated nodes in the Wireless Sensor Networks.
The paper organization is as follows: at first the network assumptions have been discussed.
Following that various detection methods are classified and described briefly.
2. Network Assumptions
The detection methods are proposed mainly based on the network assumptions. The network
assumptions which are commonly assumed are as follows:
The communication is static.
Based on the location and the ID the replicated nodes are detected.
The sensor nodes are uniformly deployed.
The nodes are deterministic except for Random Walk based approach.
There is no simultaneous communication and also collaboration between the sensor nodes.
Identity based public key system is utilized by the network.
3. Various
... Get more on HelpWriting.net ...