A comprehensive study of node replication attack in wireless sensor networks
Version 2 2024-06-03, 11:47Version 2 2024-06-03, 11:47
Version 1 2015-09-01, 15:11Version 1 2015-09-01, 15:11
conference contribution
posted on 2024-06-03, 11:47authored byWZ Khan, Y Xiang, MY Aalsalem, Q Arshad
The adversary can get benefit from the unattended nature of Sensor Networks to physically capture the sensor node, compromises the node and extracts the contents from node and clone them in many replicas. This paper attempts to comprehensively review the current research and schemes for the detection of node replication attack. In order to evaluate the maturity level of the top current scheme in replication detection, a set of significant features, that best describe the functionality and the characteristics of the schemes, has been selected to derive a comprehensive study. The aim of this survey is not to censure, but to serve as a reference for researchers and developers in this area and to provide direction for future research improvements. This paper also classifies proposed schemes into Distributed and Centralized according to their nature of defense. The complexities of communication & memory cost for both types of scheme are also evaluated.
History
Pagination
36-43
Location
Honolulu, Hawaii
Start date
2011-11-16
End date
2011-11-18
ISBN-13
9781880843833
Language
eng
Publication classification
E Conference publication, E2 Full written paper - non-refereed / Abstract reviewed
Copyright notice
2011, International Society for Computers and Their Applications
Editor/Contributor(s)
Aljahdali S
Title of proceedings
CAINE 2011 : Proceedings of the 24th International Conference on Computers and Their Applications in Industry and Engineering 2011
Event
International Society for Computers and Their Applications. Conference (24th : 2011 : Honolulu, Hawaii)
Publisher
International Society for Computers and Their Applications
Place of publication
Cary, N.C.
Series
International Society for Computers and Their Applications Conference