Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks

被引:15
|
作者
Lou, Yanxiang [1 ]
Zhang, Yong [1 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
关键词
replication attack; clone detection; network security; wireless sensor networks;
D O I
10.1016/j.proeng.2012.01.393
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile and unattended environments; they are vulnerable to physical capture and compromise. In a node replication attack or a node clone attack, an adversary physically captures a sensor node, extracts cryptographic secrets from the node, and distributes a large number of replicas of captured node throughout the network, in order to launch a variety of insider attacks. Existing node clone attack detection schemes are mainly focused on stationary sensor networks. Also most existing detection schemes make unrealistic assumptions on the ability of replicas. In this paper, we propose a novel node clone attack detection protocol, namely the Single Hop Detection (SHD) protocol, which is fully distributed, highly robust against node colluding, specifically designed for mobile WSNs. We show analytically under popular mobility models that our protocol provides effective and robust node clone attack detection capability. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:2798 / 2803
页数:6
相关论文
共 50 条
  • [31] Distributed Clone Detection in Mobile Sensor Networks
    Chowdhury, Abu Sayed
    Dhawan, Akshaye
    SENSORNETS: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2017, : 135 - 141
  • [32] Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks
    Li, Zhijun
    Gong, Guang
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 244 - 249
  • [33] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [34] Modeling Node Capture Attacks in Wireless Sensor Networks
    Tague, Patrick
    Poovendran, Radha
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1221 - 1224
  • [35] Racemote: A mobile node for wireless sensor networks
    Song, Guangming
    Zhuang, Wei
    Wei, Zhigang
    Song, Aiguo
    2006 IEEE SENSORS, VOLS 1-3, 2006, : 781 - +
  • [36] Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
    Abdelhakim, Mai
    Lightfoot, Leonard E.
    Ren, Jian
    Li, Tongtong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) : 950 - 959
  • [37] Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiaoming
    Xiong, Yan
    Chen, Depin
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 225 - 232
  • [38] Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, Aduwati
    Rasid, M. Fadlee Abdul
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [39] Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Shaukat, Muhammad Arslan
    Alezabi, Kamal Ali
    SENSORS, 2020, 20 (08)
  • [40] Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks
    Das, Anjana P.
    Thampi, Sabu M.
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 757 - 770