Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
Abstract
:1. Introduction
2. An Example of Installation of Wireless Sensor Network
3. Cybersecurity Attacks in Wireless Sensor Networks
3.1. Classification of WSNs, Attacks in WSN and Security Issues
- Deterministic and nondeterministic,
- Static and mobile,
- Static base station and mobile base station,
- Single base station and multi base station,
- Self reconfigurable and non-self configurable,
- Single-hop and multi-hop WSN,
- Homogeneous and heterogeneous.
- Coverage topology,
- Sensor holes,
- Geographic routing.
- Coverage problems,
- Low latency,
- Transmission media,
- Fault,
- Scalability.
- Operating system and hardware used for WSN,
- Properties of wireless radio communication,
- Deployment,
- Synchronization,
- Middleware,
- Architecture,
- Schemes for medium access,
- Calibration,
- Position or localization,
- Sensor networks programming models,
- Data dissemination and data aggregation,
- Database centric and querying,
- Network layer,
- Transport layer.
3.2. Classification of WSNs Attacks and Security Issues
- (1)
- Identity attacks,
- (2)
- Routing attacks and,
- (3)
- Network intrusion.
Wireless Sensor Network Specific Security Issues
3.3. Clone Node Attack (Replication Attack) in Static Wireless Sensor Networks
3.3.1. Execution of the Clone Node Attack
- The attacker physically captures the legitimate nodes in the network area.
- The attacker extracts all the sensitive information found in those legal nodes.
- The attacker uses all the obtained information to produce new nodes (malicious nodes) with the same ID of the legal nodes found in step 2.
- Finally, the attacker launches them back into a specific location of the network.
3.3.2. Clone Node Attack Detection Techniques in Static Wireless Sensor Networks
- Base station-based,
- Key usage-based,
- Location-based,
- Cluster head-based,
- Neighbor ID-based.
- Node to network broadcasting,
- Group-based,
- Witness node-based,
- Neighbor-based,
- Clustering-based,
- Cluster head-based,
- Witness path-based.
3.4. Limitation of the Wireless Sensor Networks
- Possibility of physical access to the network by an attacker.
- Works in short communication range—power consumption is high.
- Sensor nodes have batteries with a finite lifetime.
- The WSNs possess very little storage capacity—a few hundred kilobytes.
- WSNs have modest processing power—8MHz.
- WSNs require minimal energy.
- Passive devices provide little energy.
4. Mitigation of the Replication Attacks in Static Wireless Sensor Network
4.1. Key Pre-Distribution Techniques Used for the Mitigation
4.2. Authentication Methods in Wireless Sensor Network
5. Ontology in Wireless Sensor Networks
5.1. Ontology Development Process and Typical Ontology Components
- Organizing and Scoping: This step entails the set of the goals for the ontology development and entangles the assignment of the roles to the team members.
- Data Collection: This activity entails acquiring the raw data needed for building the ontology.
- Data Analysis: This activity implies analyzing the data to allow ontology extraction.
- Initial Ontology Development: This step involves developing a preparatory ontology from the obtained data.
- Ontology Refinement and Validation: This step necessitates the refinement and validation of the ontology to achieve the building process.
- Relationships: ways in which individuals and groups can communicate.
- Individuals: situations or things
- Features: aspects, class, properties, parameters, or instances that objects (and categories) can contain.
- Categories: concepts, types of objects
- Axioms: assertions or statements in a logical form that form together with the comprehensive theory that is illustrated by the ontology in their domains.
- Constraints (limitations): the formal description of what must be true until some inputs are accepted.
5.2. Ontology Structure Definition Language
5.3. Ontology Language
- Common logic https://en.wikipedia.org/wiki/Common_Logic, accessed on 14 September 2021, is ISO standard 24707, a framework for a family of logic languages or ontology languages that can be faultlessly translated into each other. In other words, this framework aims to allow the exchange and transmission of knowledge in computer-based systems.
- Common Algebraic Specification Language (CASL): it is applied to ontology specifications to deliver or to provide modularity and organizing mechanisms.
- Gellish: it is an ontology language specifically for communication and data storage.
- OntoUML: is an ontologically well-grounded language for ontology-driven conceptual modeling.
- IDEF5 languages.
IDEF5 Ontology Languages
- (1)
- The “IDEF5 schematic language”,
- (2)
- The “IDEF5 elaboration language”.
- A graphical language to help and support conceptual ontology analysis.
- A structured text language is used for detailed ontology characterization.
- A systematic procedure that provides instructions, guidelines for efficacious ontology capture.
5.4. The Importance of Ontology in Wireless Sensor Networks (WSNs)
5.5. Ontology for Replication Attacks in Static Wireless Sensor Networks (ORASWSN)
6. Related Works
7. Contribution and Future Proposal
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
WSNs | wireless sensor networks |
ORASWSN | Ontology for Replication Attacks in Static Wireless Sensor Networks |
LEACH | low-energy adaptive clustering hierarchy |
XSS | cross-site-scripting |
IDS | intrusion detection system |
PLC | programmable logic controller |
HMI | human–machine interface |
RTU | remote terminal unit |
CIA | confidentiality, integrity, availability |
AIC | availability, integrity, confidentiality |
ICS | industrial control system |
ZBNRD | bone-based node replica detection scheme for wireless sensor networks. |
N2NB | node to network broadcasting |
PAWS | pair access witness selection technique |
RAWL | random-walk based approach to detect clone attacks in wireless sensor networks. |
RWND | random-walk with network division |
NBDS | neighbor-based detection scheme for WSNs against node replication attacks. |
PRCD | clone detection based on physical layer reputation for proximity service. |
LTBRD | location and trust based replica detection in wireless sensor networks. |
LSCD | low-storage clone detection protocol for cyber-physical systems. |
References
- Jaydip, S. Security in Wireless Sensor Networks. Available online: https://arxiv.org/pdf/1301.5065.pdf (accessed on 14 September 2021).
- Dirk, W.; Joao, G.; Amardeo, S. Security Solutions for Wireless Sensor Networks. Available online: https://www.nec.com/en/global/techrep/journal/g06/n03/pdf/t060322.pdf (accessed on 14 September 2021).
- Li, C. Security of Wireless Sensor Networks: Current Status and Key Issues. Available online: https://www.intechopen.com/books/smart-wireless-sensor-networks/security-of-wireless-sensor-networks-current-status-and-key-issues (accessed on 14 September 2021).
- Mohammad, S.; Sultanul Kabir, A.F.M. Hierarchical Design Based Intrusion Detection System for Wireless Ad Hoc Sensor Network. Int. J. Netw. Secur. Appl. (IJNSA) 2010, 2, 102–117. [Google Scholar]
- Manjula, V.; Chellappan, C. Replication attack mitigations for static and mobile WSN. Int. J. Netw. Secur. Appl. (IJNSA) 2011, 3. Available online: https://arxiv.org/pdf/1103.3378.pdf (accessed on 14 September 2021). [CrossRef]
- Sensor Node Definition. Available online: https://www.igi-global.com/dictionary/cognitive-radio-sensor-networks/26486 (accessed on 14 September 2021).
- Wireless Sensor Network Components. Available online: https://www.daviteq.com/en/product-category/wireless-sensors-actuators/ (accessed on 14 September 2021).
- Programmable Logic Controller (PLC). Available online: https://www.amci.com/industrial-automation-resources/plc-automation-tutorials/what-plc/ (accessed on 14 September 2021).
- A Human-Machine Interface (HMI). 2019. Available online: https://www.exorint.com/en/blog/2019/02/07/what-is-a-human-machine-interface-and-do-you-make-or-buy-it (accessed on 14 September 2021).
- Liu, G.; Xiao, B. Jamming Attacks and Countermeasures in Wireless Area Networks. 2012. Available online: https://dl.acm.org/doi/book/10.5555/2520907 (accessed on 14 September 2021).
- Xing, K.; Srinivasan, S.S.R.; Jose, M.; Li, J.; Cheng, X. Attacks and Countermeasures in Sensor Networks: A Survey. Available online: http://staff.ustc.edu.cn/kxing/Publications/BookChapters/attack-NetworkSecurity.pdf (accessed on 14 September 2021).
- Mohamed-Lamine, M. Classification of Attacks in Wireless Sensor Networks. 2014. Available online: https://arxiv.org/pdf/1406.4516.pdf (accessed on 14 September 2021).
- Wassim, Z.; Marine, M.; Jean-Philippe, B. An Ontology for Attacks in Wireless Sensor Networks. (Last Modified, 8 July 2020). Available online: https://hal.inria.fr/inria-00333591/ (accessed on 14 September 2021).
- Shaukat, H.R.; Hashim, F.; Sali, A.; Abdul Rasid, M.F. Node replication attacks in mobile wireless sensor network: A survey. Int. J. Distrib. Sens. Netw. 2014, 10, 402541. [Google Scholar] [CrossRef]
- Shaukat, H.R.; Hashim, F.; Shaukat, M.A.; Ali Alezabi, K. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Sensors 2020, 20, 2283. [Google Scholar] [CrossRef] [Green Version]
- Choi, H.; Zhu, S.; La Porta, T.F. SET: Detecting node clones in sensor networks. In Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops—SecureComm 2007, Nice, France, 17–21 September 2007; pp. 341–350. [Google Scholar]
- Conti, M.; DiPietro, R.; Mancini, L.V.; Mei, A. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secure Comput. 2011, 8, 685–698. [Google Scholar] [CrossRef]
- Kenaza, T.; Hamoud, O.N.; Nouali-Taboudjemat, N. Efficient centralized approach to prevent from replication attack in wireless sensor networks. Secur. Commun. Netw. 2015, 8, 220–231. [Google Scholar] [CrossRef]
- Brooks, R.; Govindaraju, P.Y.; Pirretti, M.; Vijaykrishnan, N.; Kandemir, M.T. On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybern. 2007, 37, 1246–1258. [Google Scholar] [CrossRef]
- Mishra, A.K.; Turuk, A.K. A zone-based node replica detection scheme for wireless sensor networks. Wireless Pers. Commun. 2013, 69, 601–621. [Google Scholar] [CrossRef]
- Uma Maheswari, P.; Ganesh Kumar, P. Dynamic detection and prevention of clone attack in wireless sensor networks. Wirel. Pers. Commun. 2017, 94, 2043–2054. [Google Scholar] [CrossRef]
- Naruephiphat, W.; Ji, Y.; Charnsripinyo, C. An area-based approach for node replica detection in wireless sensor networks. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 745–750. [Google Scholar]
- Znaidi, W.; Minier, M.; Ubéda, S. Hierarchical node replication attacks detection in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 9, 745069. [Google Scholar] [CrossRef]
- Xing, K.; Liu, F.; Cheng, X.; Du, D.H.C. Real-time detection of clone attacks in wireless sensor networks. In Proceedings of the 2008 28th International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008. [Google Scholar]
- Muhammad, N.; Fazli, S.; Wazir Zada, K. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks. IEEE Open Access J. 2020, 8, 65450–65461. Available online: https://www.researchgate.net/publication/340150410_A_Systematic_Review_on_Clone_Node_Detection_in_Static_Wireless_Sensor_Networks (accessed on 14 September 2021).
- Abinaya, P.; Geetha, C. Dynamic detection of node replication attacks using X-RED in wireless sensor networks. In Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India, 27–28 February 2014; pp. 1–4. [Google Scholar]
- Bekara, C.; Laurent-Maknavicius, M. A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks. Available online: https://hal.archives-ouvertes.fr/hal-01355352/document (accessed on 14 September 2021).
- Parno, B.; Perrig, A.; Gligor, V. Distributed detection of node replication attacks in sensor networks. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), Oakland, CA, USA, 8–11 May 2005; pp. 49–63. [Google Scholar]
- Yuichi, S.; Shinichi, H. Distributed Detection of Node Replication Attacks Resilient to Many Compromised Nodes in Wireless Sensor Networks. 2010. Available online: https://eudl.eu/doi/10.4108/icst.wicon2008.4796 (accessed on 14 September 2021).
- Ho, J.-W.; Liu, D.; Wright, M.; Das, S.K. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Netw. 2009, 7, 1476–1488. [Google Scholar] [CrossRef]
- Cynthia, J.S.; Punithavathani, D.S. Clone attack detection using pair access witness selection technique. Int. J. Comput. Netw. Appl. 2016, 3, 118–128. [Google Scholar] [CrossRef]
- Ming, Z.; Vishal, K.; Shigang, C.; Xuelian, X. Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. 2009. Available online: https://ieeexplore.ieee.org/document/5339674 (accessed on 14 September 2021).
- Zheng, Z.; Liu, A.; Cai, L.X.; Chen, Z.; Shen, X. Energy and memory efficient clone detection in wireless sensor networks. IEEE Trans. Mob. Comput. 2016, 15, 1130–1143. [Google Scholar] [CrossRef]
- Li, Z.; Gong, G. On the node clone detection in wireless sensor networks. IEEE/ACM Trans. Netw. 2013, 21, 1799–1811. [Google Scholar] [CrossRef]
- Zeng, Y.; Cao, J.; Zhang, S.; Guo, S.; Xie, L. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J. Sel. Areas Commun. 2010, 28, 677–691. Available online: https://ieeexplore.ieee.org/document/5472424 (accessed on 14 September 2021). [CrossRef]
- Khan, W.Z.; Aalsalem, M.Y.; Saad, N.M. Distributed clone detection in static wireless sensor networks: Random walk with network division. PLoS ONE 2015, 10, e0123069. Available online: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0123069 (accessed on 14 September 2021). [CrossRef]
- Aalsalem, M.Y.; Khan, W.Z.; Saad, N.M.; Hossain, M.S.; Atiquzzaman, M.; Khan, M.K. A new random walk for replica detection in WSNs. PLoS ONE 2016, 11, e0158072. [Google Scholar]
- Ko, L.-C.; Chen, H.-Y.; Lin, G.-R. A neighbor-based detection scheme for wireless sensor networks against node replication attacks. In Proceedings of the 2009 International Conference on Ultra Modern Telecommunications & Workshops, St. Petersburg, Russia, 12–14 October 2009. [Google Scholar]
- Cheng, G.; Guo, S.; Yang, Y.; Wang, F. Replication attack detection with monitor nodes in clustered wireless sensor networks. In Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China, 14–16 December 2015; pp. 1–8. [Google Scholar]
- Amudha, G.; Narayanasamy, P. Distributed location and trust based replica detection in wireless sensor networks. Wirel. Pers. Commun. 2018, 102, 3303–3321. [Google Scholar] [CrossRef]
- Pan, F.; Pang, Z.; Xiao, M.; Wen, H.; Liao, R.-F. Clone detection based on physical layer reputation for proximity service. IEEE Access 2019, 7, 3948–3957. [Google Scholar] [CrossRef]
- Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A low-storage clone detection protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar] [CrossRef] [Green Version]
- Rajeswari1, R.S.; Seenivasagam, V. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks. 2016. Available online: https://www.hindawi.com/journals/tswj/2016/6854303/ (accessed on 14 September 2021).
- Symmetric Encryption. Available online: https://teachcomputerscience.com/symmetric-encryption/ (accessed on 14 September 2021).
- Symmetric vs. Asymmetric Encryption (Difference). Available online: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences (accessed on 14 September 2021).
- Asymmetric-Key Cryptography. NIST, Information Technology Laboratory; Computer Security Resource Center. Available online: https://csrc.nist.gov/glossary/term/asymmetric_key_cryptography (accessed on 14 September 2021).
- Wireless Sensor Network (WSN). 2021. Available online: https://www.geeksforgeeks.org/wireless-sensor-network-wsn/ (accessed on 14 September 2021).
- Kurniawan, A. Introduction to wireless sensor networks. In Practical Contiki-NG; Springer: Berkeley, CA, USA, 2018; pp. 1–46. [Google Scholar]
- Niropam, D. An Overview about Wireless Sensor Network (WSN). 2020. Available online: https://www.linkedin.com/pulse/overview-wireless-sensor-network-wsn-niropam-das (accessed on 14 September 2021).
- Jean Rosemond, D.; Karol, N. Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. 2021. Available online: https://www.mdpi.com/2624-800X/1/2/18/ (accessed on 14 September 2021).
- Mark Alan, M.; Samson, W.T.; Aneel, A. Domain Modeling with Integrated Ontologies: Principles for Reconciliation and Reuse. Available online: https://www.researchgate.net/profile/Mark-Musen (accessed on 14 September 2021).
- Abdul, S.; Mohammad, N.A. An Improved Methodology for Collaborative Construction of Reusable, Localized, and Shareable Ontology. 2021. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9335604 (accessed on 14 September 2021).
- Ban, S.M.; Ibrahiem, A. An Ontology for Mosul University. 2019. Available online: https://csmj.mosuljournals.com/pdf_163515_d7cfe071d91dea2d36882a2219cba6b6.html (accessed on 14 September 2021).
- Wang, Z.; Tian, G. Home service robot task planning using semantic knowledge and probabilistic inference. Knowl.-Based Syst. 2020, 204, 106174. [Google Scholar] [CrossRef]
- Alba, G.; Rafael, M. Integrative Base Ontology for the Research Analysis of Alzheimer’s Disease-Related Mild Cognitive Impairment. 2021. Available online: https://www.frontiersin.org/articles/10.3389/fninf.2021.561691/full (accessed on 14 September 2021).
- Muthana, Z.; Alex, F. An Ontology-Based Approach for Curriculum Mapping in Higher Education. In Proceedings of the IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Online, 27–30 January 2021; pp. 0141–0147. Available online: https://ieeexplore.ieee.org/abstract/document/9376163/metrics#metrics (accessed on 14 September 2021).
- Sina, K.; Ivanka, I. Cornell University. An Ontology-Based Approach to Data Exchanges for Robot Navigation on Construction Sites. 2021. Available online: https://arxiv.org/abs/2104.10239 (accessed on 14 September 2021).
- Luca, S.; Caryn, B. A Formal Concept Analysis Driven Ontology for ICS Cyberthreats. 2020, pp. 247–262. Available online: https://sacair.org.za/wp-content/uploads/2021/01/SACAIR_Proceedings-MainBook_vFin_sm.pdf#page=262 (accessed on 14 September 2021).
- Esther, A.; Ricardo, S. Ontologies in Autonomous Robots Engineering. 2021. Available online: https://www.intechopen.com/online-first/using-ontologies-in-autonomous-robots-engineering (accessed on 14 September 2021).
- Liu, J.; Li, Y.; Tian, X.; Sangaiah, A.K.; Wang, J. Towards Semantic Sensor Data: An Ontology Approach. Sensors 2019, 19, 1193. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Seet, B.-C.; Al-Anbuky, A. An Ontology-Based Context Model for Wireless Sensor Network (WSN) Management in the Internet of Things. J. Sens. Actuator Netw. 2013, 2, 653–674. [Google Scholar] [CrossRef]
- Martín-Lammerding, D.; Alberto, C.; José Javier, A.; Jesús, V. An Ontology-Based System to Collect WSN-UAS Data Effectively. 2021, Volume 9. Available online: https://ieeexplore.ieee.org/abstract/document/9194016 (accessed on 14 September 2021).
- Kittiphong, S.; Romchat, K. Ontology-Based Semantic Integration Of Heterogeneous Data Sources Using Ontology Mapping Approach. 2020. Available online: http://www.jatit.org/volumes/Vol98No22/13Vol98No22.pdf (accessed on 14 September 2021).
- Nicholas, C.N.; Francesco, G. An Ontology-Based Approach for Developing a Harmonised Data-Validation Tool for European Cancer Registration. 2021. Available online: https://jbiomedsem.biomedcentral.com/track/pdf/10.1186/s13326-020-00233-x.pdf (accessed on 14 September 2021).
- Wireless Sensor Networks: Types & Their Applications. Available online: https://www.elprocus.com/introduction-to-wireless-sensor-networks-types-and-applications/ (accessed on 14 September 2021).
- Carlos-Mancilla, M.; López-Mellado, E.; Mario, S. Wireless Sensor Networks Formation: Approaches and Techniques. 2016. Available online: https://www.hindawi.com/journals/js/2016/2081902/ (accessed on 14 September 2021).
- Yu, J.Y.; Lee, E.; Oh, S.R.; Seo, Y.D.; Kim, Y.G. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. 2020. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9020077 (accessed on 14 September 2021).
- Lee, C.-C. Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors 2020, 20, 744. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zhou, Y.; Huang, Z.; Wang, J.; Huang, R.; Yu, D. An energy efficient random verification protocol for the detection of node clone attacks in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 163. [Google Scholar] [CrossRef] [Green Version]
- Majid, A. Security to Wireless Sensor Networks against Malicious Attacks Using Hamming Residue Method. 2019. Available online: https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-018-1337-5 (accessed on 14 September 2021).
- Bendadouche, R.; Roussey, C.; De Sousa, G.; Chanet, J.P.; Hou, K.M. Extension of the Semantic Sensor Network Ontology for Wireless Sensor Networks: The Stimulus-WSNnode-Communication Pattern. Available online: https://hal.archives-ouvertes.fr/hal-00819301 (accessed on 14 September 2021).
- Rifat, J.; Imran, K.; Jagruti, S.; Roch, G. A Framework for Ontology Provisioning in Virtualized Wireless Sensor Networks. 2016. Available online: https://ieeexplore.ieee.org/document/7543825 (accessed on 14 September 2021).
- Kamlendu, P.; Ronak, P. Data Capturing And Retrieval from Wireless Sensor Networks Using Semantic Web. Int. J. Comput. Eng. Technol. (IJCET) 2019, 10, 60–69. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3555014 (accessed on 14 September 2021).
- Xue, X.; Wu, X.; Jiang, C.; Mao, G.; Zhu, H. Integrating sensor ontologies with global and local alignment extractions. Wirel. Commun. Mob. Comput. 2021, 2021, 6625184. Available online: https://downloads.hindawi.com/journals/wcmc/2021/6625184.pdf (accessed on 14 September 2021). [CrossRef]
- Kumar, D.R.; Shanmugam, A. A hyper heuristic localization based cloned node detection technique using gsa based simulated annealing in sensor networks. In Cognitive Computing for Big Data Systems over IoT; Springer: Cham, Switzerland, 2018; pp. 307–335. [Google Scholar]
- Olexander, B.; Tamara, L.; Liubov, H. Development of Evaluation Templates for the Protection System of Wireless Sensor Network. 2021, pp. 229–265. Available online: https://link.springer.com/chapter/10.1007/978-3-030-71892-3_10 (accessed on 14 September 2021).
- Elio, M.; Richard, C.; Philippe, A. HSSN: An Ontology for Hybrid Semantic Sensor Networks. 2019, pp. 1–10. Available online: https://dl.acm.org/doi/abs/10.1145/3331076.3331102 (accessed on 14 September 2021).
- Rob, A.; García-Castro, R.; Joshua, L.; Claus, S. Semantic Sensor Network Ontology. October 2017. Available online: https://www.w3.org/TR/vocab-ssn/ (accessed on 14 September 2021).
- Mohammad, A.; Ali, M.; Amir Masoud, R. Ontology-Based Modelling and Information Extracting of Physical Entities in Semantic Sensor Networks. IETE J. Res. 2018, 65, 540–556. Available online: https://www.tandfonline.com/doi/abs/10.1080/03772063.2018.1436471 (accessed on 14 September 2021).
- Xu, T.; Gong, L.; Zhang, W.; Li, X.; Wang, X.; Pan, W. Application of Wireless Sensor Network Technology in Logistics Information System. 2017. Available online: https://aip.scitation.org/doi/pdf/10.1063/1.4981549 (accessed on 14 September 2021).
- Hyunbum, K.; Jorge, A. Optimization Algorithms for Transmission Range and Actor Movement in Wireless Sensor and Actor Networks. Comput. Netw. 2015, 92, 116–133. Available online: https://csb.uncw.edu/mscsis/advancedstudy/mscsis-wireless-sensor-networks.html (accessed on 14 September 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dora, J.R.; Nemoga, K. Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks. J. Cybersecur. Priv. 2021, 1, 553-579. https://doi.org/10.3390/jcp1040028
Dora JR, Nemoga K. Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks. Journal of Cybersecurity and Privacy. 2021; 1(4):553-579. https://doi.org/10.3390/jcp1040028
Chicago/Turabian StyleDora, Jean Rosemond, and Karol Nemoga. 2021. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks" Journal of Cybersecurity and Privacy 1, no. 4: 553-579. https://doi.org/10.3390/jcp1040028
APA StyleDora, J. R., & Nemoga, K. (2021). Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks. Journal of Cybersecurity and Privacy, 1(4), 553-579. https://doi.org/10.3390/jcp1040028