A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack

A crucial problem in the security of wireless sensor network is that the nodes are subject to several kinds of attacks and threat like node replication attack, and it may bring serious consequence. To mitigate the damage brought by the node replication attack, in this paper, we propose a replication detection protocol that can discriminate the replicated nodes through detecting geographic fingerprints collision output from the bloom filter. If the receiver node found a conflicting location claim, that indicated there was an aggressor, then the node replication attack was detected. Moreover the usage of matrix decomposition ensured the security of the network, and also it provided the communication link verification.

[1]  Deborah Estrin,et al.  GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.

[2]  Brian D. O. Anderson,et al.  Rigidity, computation, and randomization in network localization , 2004, IEEE INFOCOM 2004.

[3]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[6]  R. Sathish,et al.  Dynamic Detection of Clone Attack in Wireless Sensor Networks , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[7]  Hung-Yuan Chen,et al.  A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[8]  Maryline Laurent-Maknavicius,et al.  A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).

[9]  Sushil Jajodia,et al.  Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[10]  Yusheng Ji,et al.  An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Huang Jie,et al.  A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.

[12]  Ma Bin QRdecomposition and genetic algorithm based optimized layout of sensors for hydraulic structures , 2012 .

[13]  Shengli Liu,et al.  Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks , 2012 .

[14]  Marine Minier,et al.  Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Xiangyi Chen,et al.  Detecting and Defending against Replication Attacks in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[17]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[18]  M. V. Ramakrishna,et al.  Practical performance of Bloom filters and parallel free-text searching , 1989, CACM.

[19]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[20]  A. Savvides,et al.  Network localization in partially localizable networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Zhao Jing Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network , 2012 .