TY - JOUR T1 - Prevention Protocol for Node Replication Attack AU - Rajasekaran, R. Thalapathi AU - Cheallappn, C. AU - Manjula, V. JO - Asian Journal of Information Technology VL - 15 IS - 21 SP - 4255 EP - 4268 PY - 2016 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2016.4255.4268 UR - https://makhillpublications.co/view-article.php?doi=ajit.2016.4255.4268 KW - node replication attack KW -clone KW -Security KW -wireless sensor network AB - A naming or addressing scheme usually requires that each node be assigned a unique name or address called as an identity in order to avoid ambiguities. Notably, routing protocols need addresses to route packets. Services need names in order to be identifiable, discoverable and useable. Attacks against naming and addressing are address stealing, Sybil attack and node replication attack. The harmful attack against Wireless Sensor Networks (WSN) is node replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. Naming and addressing are fundamental for networking. Indeed, it is not required to compromise a high number of nodes: the main cost for the adversary is to capture and to tamper just one sensor; making many clones out of the tampered sensor can be considered easy and cheap. Hence, we are concentrating on node replication attack where also basis for variety of attacks such as Sybil attack, routing attacks and link layer attacks etc. also called as denial of service attacks. As per the proverb, ‘Prevention is better than Cure’, This study proposes a prevention protocol to stop replicas before joining into the network, instead of after allowing the attack into the network and detecting them. This study discusses a novel approach for preventing the node replication attack by blocking the possible re-entry of captured node either cloned or compromised. ER -