Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks

被引:15
|
作者
Lou, Yanxiang [1 ]
Zhang, Yong [1 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
关键词
replication attack; clone detection; network security; wireless sensor networks;
D O I
10.1016/j.proeng.2012.01.393
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile and unattended environments; they are vulnerable to physical capture and compromise. In a node replication attack or a node clone attack, an adversary physically captures a sensor node, extracts cryptographic secrets from the node, and distributes a large number of replicas of captured node throughout the network, in order to launch a variety of insider attacks. Existing node clone attack detection schemes are mainly focused on stationary sensor networks. Also most existing detection schemes make unrealistic assumptions on the ability of replicas. In this paper, we propose a novel node clone attack detection protocol, namely the Single Hop Detection (SHD) protocol, which is fully distributed, highly robust against node colluding, specifically designed for mobile WSNs. We show analytically under popular mobility models that our protocol provides effective and robust node clone attack detection capability. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:2798 / 2803
页数:6
相关论文
共 50 条
  • [41] Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
    Ho, Jun-Won
    Liu, Donggang
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2009, 7 (08) : 1476 - 1488
  • [42] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147
  • [43] A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 80 - 89
  • [44] Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
    Khan, Wazir Zada
    Saad, Mohamad Naufal bin Mohamad
    Aalsalem, Mohammed Y.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 119 - 127
  • [45] An Efficient Energy based Detection of Malicious Node in Mobile Wireless Sensor Networks
    Sharmila S.
    Umamaheswari G.
    Journal of The Institution of Engineers (India): Series B, 2012, 93 (1) : 25 - 30
  • [46] Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1773 - 1781
  • [47] Dynamic Detection of Clone Attack in Wireless Sensor Networks
    Sathish, R.
    Kumar, D. Rajesh
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 501 - 505
  • [48] DV-hop node localisation algorithm with multi-mobile beacons in wireless sensor networks
    He, Wenxiu
    Wang, Xianbao
    Chen, Defu
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (03) : 297 - 307
  • [49] Cod ng Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
    Sassani , Bahman A.
    Alomirah, Abdulaziz
    Pang, Shaning
    Sarrafpour, Soshian
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 87 - 94
  • [50] On the Resilience to Node Capture Attacks of Secure Wireless Sensor Networks
    Zhao, Jun
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 887 - 893