Title :
Preventing node replication attack in static Wireless Sensor Netwroks
Author :
Singh, Moirangthem Marjit ; Singh, Ashutosh ; Mandal, Jyotsana Kumar
Author_Institution :
Dept. of Comput. Sci. & Eng., North Eastern Regional Inst. of Sci. & Technol., Nirjuli, India
Abstract :
The sensing and processing power combined with wireless communication technology makes Wireless Sensor Networks(WSN) lucrative for being exploited in abundance in days to come. However, the security of WSN remains an open challenge. One such open security challenge is the node replication attack, where the enemy captures the authentic node from the network and extracts all the security credentials like the cryptographic keys , node id , generation id etc and generate clones of the captured nodes which has the same cryptographic credentials. Many protocols have been reported in the literature to deal with node replication attacks. However few of them provide robust prevention mechanism against this attack so one or the other way vulnerability exists. In this paper, a location independent protocol is proposed to prevent the illegitimate nodes, particularly the compromised clone nodes from joining the network thereby preventing malicious nodes to cause further disturbance to the network.
Keywords :
protocols; telecommunication security; wireless sensor networks; WSN security; location independent protocol; node cloning; preventing node replication attack; security credential extraction; static wireless sensor networks; Cloning; Mobile computing; Protocols; Robustness; Security; Wireless communication; Wireless sensor networks; WSN; node replication attack; security;
Conference_Titel :
Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-6895-4
DOI :
10.1109/ICRITO.2014.7014687