Abstract
Wireless sensor networks are often deployed in adverse environments where an attackers can physically capture some of the nodes, first can reconstruct the programme, and then, can replicate them in large number of clones, easily takeover the control of network. Wireless Sensor Networks highly indispensable for securing network protection. Various kinds of major attacks have been documented in wireless sensor network, till now by many researchers. The Clone attack is a massive harmful attack against the sensor network where large number of genuine replicas are used for illegal entry into a network. Discerning the Clone attack, Sybil attack, sinkhole, and wormhole attack while multicasting is a excellent job in the wireless sensor network. The existing method Randomised, Efficient, and Distributed (RED) has only a scheme of self-healing mechanism, which just verifies the node identities by analyzing the neighbours. A survey was done on a Clone attack on the objective of dissolving this problem. The overview of survey has proposed a combined PVM (position verification method) with MVP (Message Verification and Passing) for detecting, eliminating, and eventually preventing the entry of Clone nodes within the network.
Similar content being viewed by others
References
Rathod, V., & Mehta, M. (2011). Security in wireless sensor network: a survey. Ganpat University Journal of Engineering & Technology, 1, 35–44.
Modirkhazeni, A., Ithnin, N., & Abbasi, M. (2012). Secure hierarchical routing protocols inwireless sensor network; security survey analysis. International Journal of Computer Communications and Networks, 2, 6–16.
Niu, W., Lei, J., Tong, E., et al. (2014). Context-aware service ranking in wireless sensor networks. Journal of Network and Systems Management, 22(1), 50–74.
Baig, Z. A. (2011). Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications, 34(3), 468–484.
Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Application, 2, 911–916.
Abbas, S., Merabti, M., & Llewellyn-Jones, D. (2009). Signal strength based Sybil attack detection in wireless Ad Hoc networks. In Proceedings of the 2nd international conference on development in esystems engineering (DESE’09), pp. 190–195, Abu Dhabi, UAE, December 2009.
Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal of Engineering Science & Advanced Technology, 2, 256–262.
Ssu, K.-F., Wang, W.-T., & Chang, W.-C. (2009). Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks, 53(18), 3042–3056.
Vasudeva, A., & Sood, M. (2012). Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security & Its Applications, 4(5), 135–147.
Balachandaran, N., & Sanyal, S. (2012). A review of techniques to mitigate sybil attacks. International Journal of Advanced Networking and Applications, 4, 1–6.
Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in WSN. In Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on (Vol. 2, pp. 1468–1473). IEEE.
Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre-distribution. Systems, Man, and Cybernetics—Part C: Applications And Reviews, IEEE Transactions on, 37(6), 1246–1258.
Wen, H., Luo, J., & Zho, L. (2011). Lightweight and effective detection scheme for node clone attack in wireless sensor networks. Wireless Sensor Systems, IET, 1(3), 137–143.
Naruephiphat, W., Ji, Y., & Charnsripinyo, C. (2012). An area-based approach for node replica detection in wireless sensor networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 745–750). IEEE.
Jing-Jing, G., Jin-Shuang, W., Yu-Sen, Z., & Tao, Z. (2011). Formal threat analysis for ad-hoc routing protocol: modelling and checking the sybil attack. Intelligent Automation & Soft Computing, 17(8), 1035–1047.
Komar, C., Donmez, M. Y., & Ersoy, C. (2012). Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Computer Communications, 35(10), 1185–1199.
Amuthavalli, R., & Bhuvaneswaran, R. S. (2013). Detection and prevention of sybil attack in wireless sensor network employing random password comparison method. Journal of Theoretical and Applied Information Technologygy, 67, 236–246.
Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer science and Information Security, 4(1), 2.
Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2007). A randomizes efficient, and distributed protocal for the detection of node replication attacks in wireless sensor networks. Proceedings of Mobihoc 07, pp. 80–89.
Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4, 1–9.
Xiao, L., Greenstein, J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.
Tangpong, A. (2010). Managing sybil identities in distributed systems [Ph.D. thesis], Pennsylvania State University.
Yu, H., Gibbons, P. B., Kaminsky, M. & Xiao, F. (2010). SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking, 18(3), 885–898.
Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal Volume 2015, Article ID 841267. doi:10.1155/2015/841267
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Uma Maheswari, P., Ganesh Kumar, P. Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks. Wireless Pers Commun 94, 2043–2054 (2017). https://doi.org/10.1007/s11277-016-3357-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3357-y