DocumentCode
3739059
Title
Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
Author
Mumtaz Qabulio;Yasir Arfat Malkani;Ayaz Keerio
Author_Institution
Institute of Mathematics and Computer Science, University of Sindh, Jamshoro
fYear
2015
Firstpage
50
Lastpage
55
Abstract
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can easily gain significant control over the WSN. In the literature, several schemes have been proposed to detect Clone Node Attack in general; however, limited work has been done for the prevention of this attack in mobile WSNs. Consequently, in this paper we present an approach to prevent Clone Node Attack in mobile WSNs. Since the proposed scheme neither uses node´s physical location information nor any other complex computational intensive algorithm, it is best suited for memory and computationally constrained sensor nodes. In order to evaluate the proposed scheme, we have exploited five different scenarios in which adversary can launch replicas/clones in the WSNs. These scenarios are examined theoretically as well as practically.
Keywords
"Cloning","Wireless sensor networks","Mobile communication","Nickel","Mobile computing","Protocols","Base stations"
Publisher
ieee
Conference_Titel
Information Assurance and Cyber Security (CIACS), 2015 Conference on
Type
conf
DOI
10.1109/CIACS.2015.7395566
Filename
7395566
Link To Document