{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:12Z","timestamp":1761611412364,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2017,1,15]],"date-time":"2017-01-15T00:00:00Z","timestamp":1484438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Basic Research Program of China (973 Program)","award":["2011CB302903"],"award-info":[{"award-number":["2011CB302903"]}]},{"name":"National Natural Science Foundation of China for Youth","award":["61602263"],"award-info":[{"award-number":["61602263"]}]},{"name":"the Natural Science Foundation of Jiangsu Province for Youth","award":["BK20160916"],"award-info":[{"award-number":["BK20160916"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20151507"],"award-info":[{"award-number":["BK20151507"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of Natural Science for Universities of Jiangsu Province","award":["10KJA510035"],"award-info":[{"award-number":["10KJA510035"]}]},{"name":"NUPTSF","award":["NY216020"],"award-info":[{"award-number":["NY216020"]}]},{"DOI":"10.13039\/501100008045","name":"NUIST","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008045","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"PAPD","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CICAEFT"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.<\/jats:p>","DOI":"10.3390\/s17010160","type":"journal-article","created":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T09:44:02Z","timestamp":1484559842000},"page":"160","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge"],"prefix":"10.3390","volume":"17","author":[{"given":"Chao","family":"Ding","sequence":"first","affiliation":[{"name":"College of Computer Science, Nanjing University of Posts and Telecommunications; Nanjing 210003, China"}]},{"given":"Lijun","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Internet of Things, Nanjing University of Posts and Telecommunications; Nanjing 210003, China"}]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[{"name":"Key Lab of \u201cBroadband Wireless Communication and Sensor Network Technology\u201d of Ministry of Education, Nanjing University of Posts and Telecommunications; Nanjing 210003, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,1,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","article-title":"Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement","volume":"11","author":"Fu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","article-title":"Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement","volume":"27","author":"Fu","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","article-title":"Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks","volume":"78","author":"Xie","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data","volume":"27","author":"Xia","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","article-title":"Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing","volume":"98","author":"Fu","year":"2015","journal-title":"IEICE Trans. Commun."},{"key":"ref_6","unstructured":"Parrno, B., Perrig, A., and Gligor, V.D. (2005, January 8\u201311). Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., and Roy, S. (2007, January 10\u201314). Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. Proceedings of the Computer Security Applications Conference, Miami Beach, FL, USA.","DOI":"10.1109\/ACSAC.2007.26"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Conti, M., Pietro, R.D., and Mancini, L.V. (2007, January 9\u201314). A randomized, efficient and distributed protocol for the detection of nodes replication attacks in wireless sensor networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM MobiHoc, Montreal, QC, Canada.","DOI":"10.1145\/1288107.1288119"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Abinaya, P., and Geetha, C. (2014, January 27\u201328). Dynamic detection of node replication attacks using X-RED in wireless sensor networks. Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India.","DOI":"10.1109\/ICICES.2014.7033957"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Choi, H., Zhu, S., and Potra, T.F.L. (2007, January 17\u201321). SET: Detecting node clones in sensor networks. Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops (SecureComm 2007), Nice, France.","DOI":"10.1109\/SECCOM.2007.4550353"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.1016\/j.adhoc.2009.04.008","article-title":"Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks","volume":"7","author":"Ho","year":"2009","journal-title":"Ad Hoc Netw."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Charikar, M. (2002, January 19\u201321). Similarity estimation techniques from rounding algorithms. Proceedings of the Thirty-Fourth ACM Symposium on Theory of Computing, Montreal, QC, Canada.","DOI":"10.1145\/509907.509965"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zanca, G., Zorzi, F., Zanella, A., and Zorzi, M. (2008, January 1). Experimental comparison of RSSI-based localization algorithms for indoor wireless sensor networks. Proceedings of the Workshop on Real-World Wireless Sensor Networks, Glasgow, UK.","DOI":"10.1145\/1435473.1435475"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., and Wagner, D. (2003, January 19). Secure verification of location claims. Proceedings of the ACM Workshop on Wireless Security, San Diego, CA, USA.","DOI":"10.1145\/941311.941313"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Farah, K., and Nabila, L. (2014, January 17\u201319). The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks. Proceedings of the Proceedings of International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria.","DOI":"10.1109\/INDS.2014.18"},{"key":"ref_16","unstructured":"Guo, C., Guo, S., Yang, Y., and Fei, W. (2015, January 14\u201316). Replication attack detection with monitor nodes in clustered wireless sensor networks. Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ho, Y.S., Ma, R.L., Sung, C.E., Tsai, I.C., Kang, L.W., and Yu, C.M. (2015, January 6\u20138). Deterministic detection of node replication attacks in sensor networks. Proceedings of the 2015 IEEE International Conference on Consumer Electronics, Taipei, Taiwan.","DOI":"10.1109\/ICCE-TW.2015.7217002"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Douceur, J.R. (2002, January 7\u20138). The Sybil Attack. Presented at the Revised Papers from the First International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.comnet.2015.11.010","article-title":"S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia","volume":"94","author":"Pecori","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Katz, J., and Lindell, A. (2008, January 8\u201311). Aggregate message authentication codes. Proceedings of the Cryptographers\u2019 Track at the RSA Conference, San Francisco, CA, USA.","DOI":"10.1007\/978-3-540-79263-5_10"},{"key":"ref_21","unstructured":"Chan, H., Perrig, A., and Song, D. (2003, January 11\u201314). Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Research in Security and Privacy, Berkeley, CA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V.D. (2002, January 18\u201322). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communication Security, Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_24","unstructured":"Lei, F., Wenliang, D., and Peng, N. (2005, January 13\u201317). A beacon-less location discovery scheme for wireless sensor networks. Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA."},{"key":"ref_25","first-page":"2808","article-title":"RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks","volume":"37","author":"Yang","year":"2015","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","article-title":"TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks","volume":"34","author":"Oliveira","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kumar, P., Reddy, L., and Varma, S. (2009, January 15\u201319). Distance measurement and error estimation scheme for RSSI based localization in Wireless Sensor Networks. Proceedings of the Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN), Allahabad, India.","DOI":"10.1109\/WCSN.2009.5434802"},{"key":"ref_28","unstructured":"NIST Special Publication 800-57: Recommendation for Key Management, Available online: http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-57pt1r4.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Diffie, W., and Hellman, M.E. (1977). Exhaustive Cryptanalysis of the NBS Data Encryption Standard, The Institute of Electrical and Electronics Engineering.","DOI":"10.1109\/C-M.1977.217750"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Levis, P., Lee, N., Welsh, M., and Culler, D. (2003, January 5\u20137). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA.","DOI":"10.1145\/958491.958506"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/1\/160\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:26:16Z","timestamp":1760207176000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/1\/160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,15]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,1]]}},"alternative-id":["s17010160"],"URL":"https:\/\/doi.org\/10.3390\/s17010160","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,1,15]]}}}