DocumentCode :
3739059
Title :
Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
Author :
Mumtaz Qabulio;Yasir Arfat Malkani;Ayaz Keerio
Author_Institution :
Institute of Mathematics and Computer Science, University of Sindh, Jamshoro
fYear :
2015
Firstpage :
50
Lastpage :
55
Abstract :
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can easily gain significant control over the WSN. In the literature, several schemes have been proposed to detect Clone Node Attack in general; however, limited work has been done for the prevention of this attack in mobile WSNs. Consequently, in this paper we present an approach to prevent Clone Node Attack in mobile WSNs. Since the proposed scheme neither uses node´s physical location information nor any other complex computational intensive algorithm, it is best suited for memory and computationally constrained sensor nodes. In order to evaluate the proposed scheme, we have exploited five different scenarios in which adversary can launch replicas/clones in the WSNs. These scenarios are examined theoretically as well as practically.
Keywords :
"Cloning","Wireless sensor networks","Mobile communication","Nickel","Mobile computing","Protocols","Base stations"
Publisher :
ieee
Conference_Titel :
Information Assurance and Cyber Security (CIACS), 2015 Conference on
Type :
conf
DOI :
10.1109/CIACS.2015.7395566
Filename :
7395566
Link To Document :
بازگشت