files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
108
Views
1
Downloads

Prevention Protocol for Node Replication Attack

R. Thalapathi Rajasekaran, C. Cheallappn and V. Manjula
Page: 4255-4268 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

A naming or addressing scheme usually requires that each node be assigned a unique name or address called as an identity in order to avoid ambiguities. Notably, routing protocols need addresses to route packets. Services need names in order to be identifiable, discoverable and useable. Attacks against naming and addressing are address stealing, Sybil attack and node replication attack. The harmful attack against Wireless Sensor Networks (WSN) is node replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. Naming and addressing are fundamental for networking. Indeed, it is not required to compromise a high number of nodes: the main cost for the adversary is to capture and to tamper just one sensor; making many clones out of the tampered sensor can be considered easy and cheap. Hence, we are concentrating on node replication attack where also basis for variety of attacks such as Sybil attack, routing attacks and link layer attacks etc. also called as denial of service attacks. As per the proverb, ‘Prevention is better than Cure’, This study proposes a prevention protocol to stop replicas before joining into the network, instead of after allowing the attack into the network and detecting them. This study discusses a novel approach for preventing the node replication attack by blocking the possible re-entry of captured node either cloned or compromised.


How to cite this article:

R. Thalapathi Rajasekaran, C. Cheallappn and V. Manjula. Prevention Protocol for Node Replication Attack.
DOI: https://doi.org/10.36478/ajit.2016.4255.4268
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2016.4255.4268