A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks

被引:0
|
作者
邓晓明 [1 ]
熊焰 [1 ]
机构
[1] Science and Technology,University of Science and Technology of China
基金
中国国家自然科学基金;
关键词
node replication attack; network security; mobile WSN (wireless sensor network); random waypoint model;
D O I
暂无
中图分类号
TN918.82 []; TP212.9 [传感器的应用];
学科分类号
080202 ; 0839 ; 1402 ;
摘要
Wireless sensor networks (WSNs) are often deployed in harsh environments.Thus adversaries can capture some nodes,replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks.These are referred to as node replication attacks.Some methods of defending against node replication attacks have been proposed,yet they are not very suitable for the mobile wireless sensor networks.In this paper,we propose a new protocol to detect the replicas in mobile WSNs.In this protocol,polynomial-based pair-wise key pre-distribution scheme and Counting Bloom Filters are used to guarantee that the replicas can never lie about their real identifiers and collect the number of pair-wise keys established by each sensor node.Replicas are detected by looking at whether the number of pair-wise keys established by them exceeds the threshold.We also derive accurate closed form expression for the expected number of pair-wise keys established by each node,under commonly used random waypoint model.Analyses and simulations verify that the protocol accurately detects the replicas in the mobile WSNs and supports their removal.
引用
收藏
页码:732 / 743
页数:12
相关论文
共 50 条
  • [1] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology., 2011, 26 (04) - 743
  • [2] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [3] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    [J]. Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [4] A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    [J]. MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 80 - 89
  • [5] Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
    Znaidi, Wassim
    Minier, Marine
    Ubeda, Stephane
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [6] Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohammed Naufal Bin Mohammed
    Xiang, Yang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [7] Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks
    Wang, Ze
    Zhou, Chang
    Liu, Yiran
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [8] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768
  • [9] Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. 2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1085 - +
  • [10] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69