Skip to main content
Log in

Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are often deployed in adverse environments where an attackers can physically capture some of the nodes, first can reconstruct the programme, and then, can replicate them in large number of clones, easily takeover the control of network. Wireless Sensor Networks highly indispensable for securing network protection. Various kinds of major attacks have been documented in wireless sensor network, till now by many researchers. The Clone attack is a massive harmful attack against the sensor network where large number of genuine replicas are used for illegal entry into a network. Discerning the Clone attack, Sybil attack, sinkhole, and wormhole attack while multicasting is a excellent job in the wireless sensor network. The existing method Randomised, Efficient, and Distributed (RED) has only a scheme of self-healing mechanism, which just verifies the node identities by analyzing the neighbours. A survey was done on a Clone attack on the objective of dissolving this problem. The overview of survey has proposed a combined PVM (position verification method) with MVP (Message Verification and Passing) for detecting, eliminating, and eventually preventing the entry of Clone nodes within the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Rathod, V., & Mehta, M. (2011). Security in wireless sensor network: a survey. Ganpat University Journal of Engineering & Technology, 1, 35–44.

    Google Scholar 

  2. Modirkhazeni, A., Ithnin, N., & Abbasi, M. (2012). Secure hierarchical routing protocols inwireless sensor network; security survey analysis. International Journal of Computer Communications and Networks, 2, 6–16.

    Google Scholar 

  3. Niu, W., Lei, J., Tong, E., et al. (2014). Context-aware service ranking in wireless sensor networks. Journal of Network and Systems Management, 22(1), 50–74.

    Article  Google Scholar 

  4. Baig, Z. A. (2011). Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications, 34(3), 468–484.

    Article  Google Scholar 

  5. Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Application, 2, 911–916.

    Google Scholar 

  6. Abbas, S., Merabti, M., & Llewellyn-Jones, D. (2009). Signal strength based Sybil attack detection in wireless Ad Hoc networks. In Proceedings of the 2nd international conference on development in esystems engineering (DESE’09), pp. 190–195, Abu Dhabi, UAE, December 2009.

  7. Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal of Engineering Science & Advanced Technology, 2, 256–262.

    Google Scholar 

  8. Ssu, K.-F., Wang, W.-T., & Chang, W.-C. (2009). Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks, 53(18), 3042–3056.

    Article  MATH  Google Scholar 

  9. Vasudeva, A., & Sood, M. (2012). Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security & Its Applications, 4(5), 135–147.

    Article  Google Scholar 

  10. Balachandaran, N., & Sanyal, S. (2012). A review of techniques to mitigate sybil attacks. International Journal of Advanced Networking and Applications, 4, 1–6.

    Google Scholar 

  11. Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in WSN. In Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on (Vol. 2, pp. 1468–1473). IEEE.

  12. Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre-distribution. Systems, Man, and Cybernetics—Part C: Applications And Reviews, IEEE Transactions on, 37(6), 1246–1258.

    Article  Google Scholar 

  13. Wen, H., Luo, J., & Zho, L. (2011). Lightweight and effective detection scheme for node clone attack in wireless sensor networks. Wireless Sensor Systems, IET, 1(3), 137–143.

  14. Naruephiphat, W., Ji, Y., & Charnsripinyo, C. (2012). An area-based approach for node replica detection in wireless sensor networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 745–750). IEEE.

  15. Jing-Jing, G., Jin-Shuang, W., Yu-Sen, Z., & Tao, Z. (2011). Formal threat analysis for ad-hoc routing protocol: modelling and checking the sybil attack. Intelligent Automation & Soft Computing, 17(8), 1035–1047.

    Article  Google Scholar 

  16. Komar, C., Donmez, M. Y., & Ersoy, C. (2012). Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Computer Communications, 35(10), 1185–1199.

    Article  Google Scholar 

  17. Amuthavalli, R., & Bhuvaneswaran, R. S. (2013). Detection and prevention of sybil attack in wireless sensor network employing random password comparison method. Journal of Theoretical and Applied Information Technologygy, 67, 236–246.

    Google Scholar 

  18. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer science and Information Security, 4(1), 2.

    Google Scholar 

  19. Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2007). A randomizes efficient, and distributed protocal for the detection of node replication attacks in wireless sensor networks. Proceedings of Mobihoc 07, pp. 80–89.

  20. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4, 1–9.

    Google Scholar 

  21. Xiao, L., Greenstein, J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.

    Article  Google Scholar 

  22. Tangpong, A. (2010). Managing sybil identities in distributed systems [Ph.D. thesis], Pennsylvania State University.

  23. Yu, H., Gibbons, P. B., Kaminsky, M. & Xiao, F. (2010). SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking, 18(3), 885–898.

    Article  Google Scholar 

  24. Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal Volume 2015, Article ID 841267. doi:10.1155/2015/841267

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Uma Maheswari.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uma Maheswari, P., Ganesh Kumar, P. Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks. Wireless Pers Commun 94, 2043–2054 (2017). https://doi.org/10.1007/s11277-016-3357-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3357-y

Keywords

Navigation