Back to Search Start Over

Node Clone Detection Protocols for Protect the WSNs: A Survey.

Authors :
Alkhafagee, Karrar
Alsharifi, Aladdin Abbas
Source :
Ingénierie des Systèmes d'Information; Jun2024, Vol. 29 Issue 3, p1161-1174, 14p
Publication Year :
2024

Abstract

The aim of this survey is to limit the largest number of these techniques in one place in the form of tables in order for the researcher to distinguish between them and know the extent of their benefits and disadvantages, as well as in order for the researcher to avoid falling into these defects as much as possible when he makes his own cloned contract detection system. In this paper, we have conducted a comprehensive review of the collection of several techniques for detecting centralized and distributed replication attacks, where nodes can be static or mobile sensor nodes, and tables were made summarizing what was mentioned in these techniques, each according to the results reached by the researchers. A Wireless Sensor Network (WSN) is a system of self-contained sensor nodes that monitor environmental (or physical) parameters with limitations on battery life, memory capacity, and computational power. WSNs are open to several types of attacks due to their use in unmoderated and insecure contexts. Cloning attacks, or (replication attacks), are a type of physical attack. A network adversary can quickly control a single node and collect data from it. Then reprogram it to make a copy of the captured node. Identifying a duplicate node becomes difficult once these clones are spread throughout the network and are accepted as original nodes. A technology or (protocol) must be found that ideally prevents the node from being cloned, as researchers have not been able to create a 100% secure system to prevent the effects of node cloning, which include network traffic monitoring, sensor spoofing, mock data injection, sabotage of data collection, signal jamming, denial-of-service attacks, and disrupting network tasks. Creating a comparison table between techniques for preventing node cloning provides many benefits, including quickly finding the appropriate technique. It is considered a comprehensive and quick-access reference. It facilitates the decision-making process and prevents making mistakes that researchers made previously. It provides visual assistance for analyzing the strengths and weaknesses of each technique in an easier and faster way. The researcher was able to choose the most appropriate technology to develop and improve the quality of its performance to reach the ideal technology in future works. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
16331311
Volume :
29
Issue :
3
Database :
Complementary Index
Journal :
Ingénierie des Systèmes d'Information
Publication Type :
Academic Journal
Accession number :
178256197
Full Text :
https://doi.org/10.18280/isi.290333