Distributed detection of node replication attacks in sensor networks

被引:282
|
作者
Parno, B [1 ]
Perrig, A [1 ]
Gligor, V [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/SP.2005.8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Previous node replication detection schemes depend primarily on centralized mechanisms with single points of failure, or on neighborhood voting protocols that fail to detect distributed replications. To address these fundamental limitations' we propose two new algorithms based on emergent properties [17], i.e., properties that arise only through the collective action of multiple nodes. Randomized Multicast distributes node location information to randomly-selected witnesses, exploiting the birthday paradox to detect replicated nodes, while Line-Selected Multicast uses the topology of the network to detect replication. Both algorithms provide globally-aware, distributed node-replica detection, and Line-Selected Multicast displays particularly strong performance characteristics. We show that emergent algorithms represent a promising new approach to sensor network security; moreover, our results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 50 条
  • [1] Efficient distributed detection of node replication attacks in sensor networks
    Zhu, Bo
    Setia, Sanjeev
    Addada, Venkata Gopala Krishna
    Jajodia, Sushil
    Roy, Sankardas
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 257 - +
  • [2] Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. 2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1085 - +
  • [3] Deterministic Detection of Node Replication Attacks in Sensor Networks
    Ho, Yu-Shen
    Ma, Ruay-Lien
    Sung, Cheng-En
    Tsai, I-Chen
    Kang, Li-Wei
    Yu, Chia-Mu
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 468 - 469
  • [4] A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    [J]. MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 80 - 89
  • [5] Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
    Znaidi, Wassim
    Minier, Marine
    Ubeda, Stephane
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [6] Node Replication Attack Detection in Distributed Wireless Sensor Networks
    Sujihelen, L.
    Boddu, Rajasekhar
    Murugaveni, S.
    Arnika, Ms
    Haldorai, Anandakumar
    Reddy, Pundru Chandra Shaker
    Feng, Suili
    Qin, Jiayin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohammed Naufal Bin Mohammed
    Xiang, Yang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [8] Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks
    Wang, Ze
    Zhou, Chang
    Liu, Yiran
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [9] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768
  • [10] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69