Header menu link for other important links
X
Prevention protocol for node replication attack
, C. Cheallappn, R. Thalapathi Rajasekaran
Published in Medwell Journals
2016
Volume: 15
   
Issue: 21
Pages: 4255 - 4268
Abstract
A naming or addressing scheme usually requires that each node be assigned a unique name or address called as an identity in order to avoid ambiguities. Notably, routing protocols need addresses to route packets. Services need names in order to be identifiable, discoverable and useable. Attacks against naming and addressing are address stealing, Sybil attack and node replication attack. The harmful attack against Wireless Sensor Networks (WSN) is node replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. Naming and addressing are fundamental for networking. Indeed, it is not required to compromise a high number of nodes: the main cost for the adversary is to capture and to tamper just one sensor; making many clones out of the tampered sensor can be considered easy and cheap. Hence, we are concentrating on node replication attack where also basis for variety of attacks such as Sybil attack, routing attacks and link layer attacks etc. also called as denial of service attacks. As per the proverb, 'Prevention is better than Cure', This study proposes a prevention protocol to stop replicas before joining into the network, instead of after allowing the attack into the network and detecting them. This study discusses a novel approach for preventing the node replication attack by blocking the possible re-entry of captured node either cloned or compromised. © Medwell Journals, 2016.
About the journal
JournalAsian Journal of Information Technology
PublisherMedwell Journals
ISSN16823915