Distributed Detection of Clone Attacks in Wireless Sensor Networks

被引:97
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto [2 ]
Mancini, Luigi Vincenzo [1 ]
Mei, Alessandro [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
[2] Univ Rome Tre, Dipartimento Matemat, I-00146 Rome, Italy
关键词
Wireless sensor networks security; node replication attack detection; distributed protocol; resilience; efficiency; COMMUNICATION;
D O I
10.1109/TDSC.2010.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol to be used in the WSN-resource-constrained environment. Further, they are vulnerable to the specific adversary models introduced in this paper. The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new self-healing, Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks, and we show that it satisfies the introduced requirements. Finally, extensive simulations show that our protocol is highly efficient in communication, memory, and computation; is much more effective than competing solutions in the literature; and is resistant to the new kind of attacks introduced in this paper, while other solutions are not.
引用
收藏
页码:685 / 698
页数:14
相关论文
共 50 条
  • [11] Distributed detection in wireless sensor networks
    Cheng, Sheng-Tzong
    Li, Szu-Yun
    Chen, Chia-Mei
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 401 - +
  • [12] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147
  • [13] Dynamic Detection of Clone Attack in Wireless Sensor Networks
    Sathish, R.
    Kumar, D. Rajesh
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 501 - 505
  • [14] Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
    Ho, Jun-Won
    Liu, Donggang
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2009, 7 (08) : 1476 - 1488
  • [15] A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 80 - 89
  • [16] An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
    Zhou, Yuping
    Huang, Zhenjie
    Wang, Juan
    Huang, Rufeng
    Yu, Dongmei
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014, : 1 - 12
  • [17] An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
    Yuping Zhou
    Zhenjie Huang
    Juan Wang
    Rufeng Huang
    Dongmei Yu
    EURASIP Journal on Wireless Communications and Networking, 2014 (1)
  • [18] Distributed actuation attacks in wireless sensor networks: Implications and countermeasures
    Czarlinska, Alexandra
    Kundur, Deepa
    DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, 2006, : 3 - +
  • [19] Distributed detection of node replication attacks in sensor networks
    Parno, B
    Perrig, A
    Gligor, V
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 49 - 63
  • [20] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161