Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 21
Page No. 4255 - 4268

Prevention Protocol for Node Replication Attack

Authors : V. Manjula, C. Cheallappn and R. Thalapathi Rajasekaran

Abstract: A naming or addressing scheme usually requires that each node be assigned a unique name or address called as an identity in order to avoid ambiguities. Notably, routing protocols need addresses to route packets. Services need names in order to be identifiable, discoverable and useable. Attacks against naming and addressing are address stealing, Sybil attack and node replication attack. The harmful attack against Wireless Sensor Networks (WSN) is node replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. Naming and addressing are fundamental for networking. Indeed, it is not required to compromise a high number of nodes: the main cost for the adversary is to capture and to tamper just one sensor; making many clones out of the tampered sensor can be considered easy and cheap. Hence, we are concentrating on node replication attack where also basis for variety of attacks such as Sybil attack, routing attacks and link layer attacks etc. also called as denial of service attacks. As per the proverb, ‘Prevention is better than Cure’, This study proposes a prevention protocol to stop replicas before joining into the network, instead of after allowing the attack into the network and detecting them. This study discusses a novel approach for preventing the node replication attack by blocking the possible re-entry of captured node either cloned or compromised.

How to cite this article:

V. Manjula, C. Cheallappn and R. Thalapathi Rajasekaran, 2016. Prevention Protocol for Node Replication Attack. Asian Journal of Information Technology, 15: 4255-4268.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved