Distributed Detection of Clone Attacks in Wireless Sensor Networks

被引:97
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto [2 ]
Mancini, Luigi Vincenzo [1 ]
Mei, Alessandro [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
[2] Univ Rome Tre, Dipartimento Matemat, I-00146 Rome, Italy
关键词
Wireless sensor networks security; node replication attack detection; distributed protocol; resilience; efficiency; COMMUNICATION;
D O I
10.1109/TDSC.2010.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol to be used in the WSN-resource-constrained environment. Further, they are vulnerable to the specific adversary models introduced in this paper. The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new self-healing, Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks, and we show that it satisfies the introduced requirements. Finally, extensive simulations show that our protocol is highly efficient in communication, memory, and computation; is much more effective than competing solutions in the literature; and is resistant to the new kind of attacks introduced in this paper, while other solutions are not.
引用
收藏
页码:685 / 698
页数:14
相关论文
共 50 条
  • [1] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    [J]. AD HOC NETWORKS, 2010, 28 : 208 - +
  • [2] Detection system of clone attacks based on RSSI in wireless sensor networks
    [J]. Zhou, X. (zhouxcun@mail.ustc.edu.cn), 1600, Academy Publisher (08):
  • [3] Real-time Detection of Clone Attacks in Wireless Sensor Networks
    Xing, Kai
    Liu, Fang
    Cheng, Xiuzhen
    Du, David H. C.
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 3 - +
  • [4] Distributed Detection in Wireless Sensor Networks under Byzantine Attacks
    Luo, Junhai
    Cao, Zan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [5] Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks
    Lou, Yanxiang
    Zhang, Yong
    Liu, Shengli
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2798 - 2803
  • [6] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [7] On the Node Clone Detection in Wireless Sensor Networks
    Li, Zhijun
    Gong, Guang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (06) : 1799 - 1811
  • [8] Distributed Clone Detection in Mobile Sensor Networks
    Chowdhury, Abu Sayed
    Dhawan, Akshaye
    [J]. SENSORNETS: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2017, : 135 - 141
  • [9] Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
    Abdelhakim, Mai
    Lightfoot, Leonard E.
    Ren, Jian
    Li, Tongtong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) : 950 - 959
  • [10] Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, N. M.
    [J]. PLOS ONE, 2015, 10 (05):