Article Information  
On Node Replication Attack in Wireless Sensor Networks

Keywords: Wireless Sensor Networks Security, Node Replication, Clone Node Attack

Mehran University Research Journal of Engineering & Technology

Volume 34 ,  Issue 4

Mumtaz  Qabulio , Yasir Arfat  Malkani , Ayaz Ahmed  Keerio ,

References
1. Padmavathi, G.M.D.S., “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of Computer Science and Information Security, Volume 4, No. 1, 2009
2. Singh, M.M., Ankita, S., and Jyotsna, K.M., “Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networks”, International Journal of Information and Computation Technology, Volume 4, No. 2, 2014
3. Ansari, M.H.V.T., “Classification And Aanalysis Of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks”, International Journal of Scientific and Research Publications, Volume 2, No. 11, 2012
4. Sagar, C.J.G.N., “Survey on Distributed Detection of Clone Attacks in Wireless Sensor Networks”, 2014
5. Choi, H., and Thomas, S.Z., “SET: Detecting Node Clones in Sensor Networks”, Proceedings of 3 rd International Conference on Security and Privacy in Communications Networks and the WorkshopsSecureComm, 2007
6. Bekara, C., "Defending Against Nodes Replication Attacks on Wireless Sensor Networks", 2012.
7. Yu, C.M., "CSI: Compressed Sensing-Based Clone Identification in Sensor Networks", Proceedings of 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, 2012
8. Parno, B.J., "Distributed Detection of Node Replication Attacks in Sensor Networks", Master Thesis, 2005.
9. Bryan, P.A.P, and Gligor, V., "Distributed Detection of Node Replication Attacks in Sensor Networks", IEEE Symposium on Security and Privacy, pp. 49-63, 2005
10. Conti, C., "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks", Proceedings of 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007
11. Conti, M., "Distributed Detection of Clone Attacks in Wireless Sensor Networks", IEEE Transaction on Dependable and Secure Computing, 2011
12. Zeng, Y., "Random-Walk Based Approach to Detect CloneAttacks in Wireless Sensor Networks", IEEE Journal on Selected Areas in Communications, Volume 28, No. 5, 2010
13. Li, Z., and Gong, G., “Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks”, IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems, 2009
14. Znaidi, W.M.M., and Ubeda, S., "Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks", International Journal of Distributed Sensor Networks, 2013
15. Xia, D., and Vlajic, N., "Near-Optimal Node Clustering in Wireless sensor Networks for Environment Monitoring", Proceedings of IEEE 21st International Conference on Advanced Information Networking and Applications, 2007.
16. Zhu, B., "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks", Proceedings of IEEE 23rd International Conference on Computer Security Applications, 2007
17. Zhang, M., "Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks", Proceedings of 17th IEEE International Conference on Neywork Protocols, 2009
18. Ho, J.W., "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis", INFOCOM, 2009.
19. Abraham, W., "Sequential Tests of Statistical Hypotheses", The Annals of Mathematical Statistics, 1945.
20. Raja, G., "Efficient Detection of Node Replication Attacks in Mobile Sensor Networks", International Journal of Innovative Research in Computer and Communication Engineering, Volume 2, No. 2, 2014
21. Balaji, N., and Anitha, M., "Efficient Distributed Detection of Node Replication Attacks in Mobile Sensor Networks", International Journal of Research in Engineering and Technology, 2014.
22. Yu, C.M., "Mobile Sensor Network Resilient Against Node Replication Attacks", 5th Annual IEEE Communications Society Conference Sensor on Mesh and Ad Hoc Communications and Networks, 2008.
23. Yu, C.M., "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks", Proceedings of IEEE Conference on Vehicular Technology, 2009.
24. Loua, Y., "Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks", Procedia Engineering, Volume 29, 2012
25. Deng, X., "Mobility-Assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks", Proceedings of 6th International Conference on Wireless and Mobile Computing, Networking and Communications, 2010.
26. Jian1, H., "A Range-Based Detection Method of Replication Attacks in Wireless Sensor Networks", Proceedings of International Conference on Information and Computer Networks, 2012.
27. Ko, L.C., "A Neighbor-Based Detection Scheme for Wireless Sensor Networks Against Node Replication Attacks", International Conference on Ultra Modern Telecommunications & Workshops, 2009
28. Khan, W.Z., and Mohammed, Y., "Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey", International Journal of Distributed Sensor Networks, Volume 2013, pp. 22, Article ID 149023, 2013.
29. Khan, W.Z., Saad, M.N.B.M., Mohammed, Y., "Scrutinising Well-Known Countermeasures Against Clone Node Attack in Mobile Wireless Sensor Networks", International Journal of Grid and Utility Computing, Volume 4, No. 2, pp. 119-127, 2013.