A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks

Mojtaba Jamshidi, Abdusalam Abdulla Shaltooki, Zahra Dagal Zadeh, Aso Mohammad Darwesh


One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated and its efficiency is evaluated in terms of probability of detecting replica nodes. Experiment results show that the proposed algorithm has favorable performance in detection of replica nodes.


Static wireless sensor networks, replica node attack, dynamic ID assignment, multi-tree structure


Akyildiz, I.F. and Kasimoglu, I.H., 2004. Wireless sensor and actor☆ networks: research challenges. Ad hoc networks, 2(4), pp.351-367.

Jamshidi, M., Zangeneh, E., Esnaashari, M. and Meybodi, M.R., 2017. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Computers & Electrical Engineering, 64, pp.220-232.

Jamshidi, M., Ranjbari, M., Esnaashari, M., Qader, N.N. and Meybodi, M.R., 2018. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes. JOIV: International Journal on Informatics Visualization, 2(3), pp.159-165.

Dhakne, A.R. and Chatur, P.N., 2017. Detailed Survey on attacks in wireless sensor network. In Proceedings of the International Conference on Data Engineering and Communication Technology on (pp. 319-331). Springer, Singapore.

Padmavathi, D.G. and Shanmugapriya, M., 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.

Parno, B., Perrig, A. and Gligor, V., 2005, May. Distributed detection of node replication attacks in sensor networks. In Security and Privacy, 2005 IEEE Symposium on (pp. 49-63). IEEE.

Choi, H., Zhu, S. and La Porta, T.F., 2007, SET: Detecting node clones in sensor networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on (pp. 341-350). IEEE.

Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S. and Roy, S., 2007. Efficient distributed detection of node replication attacks in sensor networks. In acsac (pp. 257-267). IEEE.

Conti, M., Di Pietro, R., Mancini, L.V. and Mei, A., 2007. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 80-89). ACM.

Conti, M., Di Pietro, R., Mancini, L. and Mei, A., 2011. Distributed detection of clone attacks in wireless sensor networks. IEEE transactions on dependable and secure computing, 8(5), pp.685-698.

Kim, C., Park, C., Hur, J., Lee, H. and Yoon, H., 2009. A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks. In Communication and Networking (pp. 405-412). Springer, Berlin, Heidelberg.

Zeng, Y., Cao, J., Zhang, S., Guo, S. and Xie, L., 2010. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE Journal on selected areas in communications, 28(5).

Yu, C.M., Lu, C.S. and Kuo, S.Y., 2012. CSI: compressed sensing-based clone identification in sensor networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on (pp. 290-295). IEEE.

Zhang, M., Khanapure, V., Chen, S. and Xiao, X., 2009. Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Network Protocols, 2009. ICNP 2009. 17th IEEE International Conference on (pp. 284-293). IEEE.

Yu, C.M., Lu, C.S. and Kuo, S.Y., 2008. Mobile sensor network resilient against node replication attacks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2008. SECON'08. 5th Annual IEEE Communications Society Conference on (pp. 597-599). IEEE.

Ho, J.W., Wright, M. and Das, S.K., 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In INFOCOM 2009, IEEE (pp. 1773-1781). IEEE.

Yu, C.M., Lu, C.S. and Kuo, S.Y., 2009, September. Efficient and distributed detection of node replication attacks in mobile sensor networks. In Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th (pp. 1-5). IEEE.

Gowtham, B. and Sharmila, S., 2012. Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network. Proc. of the Special Issue of International Journal of Computer Applications (0975–8887) on Information Processing and Remote Computing–IPRC.

Deng, X.M. and Xiong, Y., 2011. A new protocol for the detection of node replication attacks in mobile wireless sensor networks. Journal of Computer Science and Technology, 26(4), pp.732-743.

Lou, Y., Zhang, Y. and Liu, S., 2012. Single hop detection of node clone attacks in mobile wireless sensor networks. Procedia Engineering, 29, pp.2798-2803.

Ho, J.W., Wright, M. and Das, S.K., 2011. Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE transactions on mobile computing, 10(6), pp.767-782.

Zhu, W.T., Zhou, J., Deng, R.H. and Bao, F., 2012. Detecting node replication attacks in mobile sensor networks: theory and approaches. Security and Communication Networks, 5(5), pp.496-507.

Conti, M., Di Pietro, R. and Spognardi, A., 2012. Wireless sensor replica detection in mobile environments. In International Conference on Distributed Computing and Networking (pp. 249-264). Springer, Berlin, Heidelberg.

Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R. and Shenker, S., 2002. GHT: a geographic hash table for data-centric storage. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (pp. 78-87). ACM.

Bloom, B.H., 1970. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), pp.422-426.

Bekara, C. and Laurent-Maknavicius, M., 2007. A new protocol for securing wireless sensor networks against nodes replication attacks. In Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on (pp. 59-59). IEEE.

Seah, W.K., Tan, H.P. and Lee, P.W., 2010. Multipath virtual sink architecture for underwater sensor networks. In Underwater Acoustic Sensor Networks (pp. 78-113). Auerbach Publications.

Jamshidi, M., Andalib, A. and Naseri, L., 2016. A Three-level Propagation Method of Routing Packets Specialized for Underwater Wireless Sensor Networks. International Journal of Computer Applications, 147(7).

J-SIM Simulator, https://sites.google.com/site/jsimofficial/, December 25, 2017.

DOI: http://dx.doi.org/10.30630/joiv.3.1.161


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats