Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

被引:7
|
作者
Wang, Ze [1 ]
Zhou, Chang [1 ]
Liu, Yiran [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin, Peoples R China
基金
中国国家自然科学基金;
关键词
DISTRIBUTED DETECTION; CLONE ATTACKS; PROTOCOL; SECURITY;
D O I
10.1155/2017/8636379
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1085 - +
  • [2] Efficient distributed detection of node replication attacks in sensor networks
    Zhu, Bo
    Setia, Sanjeev
    Addada, Venkata Gopala Krishna
    Jajodia, Sushil
    Roy, Sankardas
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 257 - +
  • [3] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768
  • [4] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69
  • [5] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, 26 (04) : 732 - 743
  • [6] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [7] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [8] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [9] Distributed detection of node replication attacks in sensor networks
    Parno, B
    Perrig, A
    Gligor, V
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 49 - 63
  • [10] Deterministic Detection of Node Replication Attacks in Sensor Networks
    Ho, Yu-Shen
    Ma, Ruay-Lien
    Sung, Cheng-En
    Tsai, I-Chen
    Kang, Li-Wei
    Yu, Chia-Mu
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 468 - 469