Preventing Node Replication Attack in Mobile Wireless Sensor Networks

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)


Node replication is a challenging security issue in sensor networks. Attacker compromises one node, creates copy of that node, and captures the sensed information forwarded to the base station. This work proposes a centralized technique for preventing the MWSN from replicated attack. The proposed technique detects the attacker at very early stage, thereby receiving sensed data at the base station in secure manner. Experimental results indicate the feasibility of the proposed scheme that it is suitable for MWSN in real-time environment.


Node replication MWSN Security 


  1. 1.
    Munir SA, Ren B, Jiao W, Wang B, Xie D, Ma J (2007) Mobile wireless sensor network: architecture and enabling technologies for ubiquitous computing. In: 21st international conference on advanced information networking and applications Google Scholar
  2. 2.
    Ehsan S, Bradford K, Brugger M, Hamdaoui B, Kovchegov Y, Johnson D, Louhaichi M (2012) Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals. IEEE Trans Wireless Comm 11(3):1220–1227Google Scholar
  3. 3.
    White B, Tsourdos A, Ashokaraj I, Subchan S, Zbikowski R (2008) Contaminant cloud boundary monitoring using network of UAV sensors. IEEE Sensors J l. 8(10):1681–1692Google Scholar
  4. 4.
    Parno B, Perrig A, Gligor V (2005) Distributed detection of node replication attacks in sensor networks. In: IEEE Symposium on security and privacyGoogle Scholar
  5. 5.
    Giannetsos T, Dimitriou T (2013) Spy-sense: spyware tool for executing stealthy exploits against sensor networks. In: 2nd ACM hotwisecGoogle Scholar
  6. 6.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: IEEE international workshop on sensor network protocols and applicationsGoogle Scholar
  7. 7.
    Singh A, Gupta K (2016) Review of security issues in mobile wireless sensor networks. J Adv Netw Appl 7(5):2887–2892Google Scholar
  8. 8.
    Krontiris I, Giannetsos T, Dimitriou T (2008) Launching a sinkhole attack in wireless sensor networks; the intruder side. In: WiMobGoogle Scholar
  9. 9.
    Manjunatha TN, Sushma MD, Shivakumar KM (2013) Security concepts and sybil attack detection in wireless sensor networks. J Emerg Trends Technol Comput Sci 2(2):383–390 Google Scholar
  10. 10.
    Singh A, Gupta K (2016) Optimal cluster head election algorithm for mobile wireless sensor networks. In: Proceedings of ICTCS’16Google Scholar
  11. 11.
    Zhu WT, Zhou J, Deng RH, Bao F (2012) Detecting node replication attacks in wireless sensor networks: a survey. J Netw Comput Appl 35:1022–1034Google Scholar
  12. 12.
    Arboleda LM, Nasser N (2006) Cluster-based routing protocol for mobile sensor networks. In: Proceedings of the 3rd ACM conference on quality of service in heterogeneous wired/wireless networksGoogle Scholar
  13. 13.
    Yu M, Li JH, Levy R (2006) Mobility resistant clustering in multi-hop wireless networks. J Netw 1(1):12–19Google Scholar
  14. 14.
    Khan AR, Ali S, Mustafa S, Othman M (2012) Impact of mobility models on clustering based routing protocols in mobile WSNs. In: 10th IEEE conference on frontiers of information technology (FIT)Google Scholar
  15. 15.
    Yu CM, Lu CS, Kuo SY (2008) Mobile sensor network resilient against node replication attacks. In: 5th IEEE Conference on Sensor, Mesh and Ad Hoc Communication and Networks (SECON)Google Scholar
  16. 16.
    Alrashed EA, Karaata MH (2014) Imposter detection in mobile wireless sensor networks. Int J Comput Commun Eng 3(6)Google Scholar
  17. 17.
    Hall J, Barbeau M, Kranakis E (2003) Detection of transient in radio frequency fingerprinting using signal phase. In: Proceedings of IASTED international conference on wireless and optical communications (WOC)Google Scholar
  18. 18.
    Bhuse V, Gupta A (2006) Anomaly intrusion detection in wireless sensor networks. J. High Speed Netw 15(1):33–51Google Scholar
  19. 19.
    Hussain S, Rahman MS (2009) Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks. In: Proceedings of SPIEGoogle Scholar
  20. 20.
    Ho JW, Wright M, Das SK (2009) Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: INFOCOMGoogle Scholar
  21. 21.
    Zhu WT, Zhou J, Deng RH, Bao F (2011) Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur Commun Netw, 5:496–507Google Scholar
  22. 22.
    Liu J, Baek J, Zhou J, Yang Y, Wong J-W (2010) Efficient online/offline identity-based signature for wireless sensor network. Int J Info Secur (9), 287–296Google Scholar
  23. 23.
    Krontiris I, Giannetsos T, Dimitriou T (2008) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. In: SECURECOMMGoogle Scholar
  24. 24.
    Yu CM, Lu CS, Kuo SY (2009) Efficient and distributed detection of node replication attacks in mobile sensor networks. In: Vehicular technology conference (VTC)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Guru Nanak Girls CollegeYamuna NagarIndia
  2. 2.Maharishi Markandeshwar UniversityMullanaIndia

Personalised recommendations