LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems

Cyber-physical systems (CPSs) have recently become an important research field not only because of their important and varied application scenarios, including transportation systems, smart homes, surveillance systems, and wearable devices but also because the fundamental infrastructure has yet to be well addressed. Wireless sensor networks (WSNs), as a type of supporting infrastructure, play an irreplaceable role in CPS design. Specifically, secure communication in WSNs is vital because information transferred in the networks can be easily stolen or replaced. Therefore, this paper presents a novel distributed low-storage clone detection protocol (LSCD) for WSNs. We first design a detection route along the perpendicular direction of a witness path with witness nodes deployed in a ring path. This ensures that the detection route must encounter the witness path because the distance between any two detection routes must be smaller than the witness path length. In the LSCD protocol, clone detection is processed in a nonhotspot region where a large amount of energy remains, which can improve energy efficiency as well as network lifetime. Extensive simulations demonstrate that the lifetime, storage requirements, and detection probability of our protocol are substantially improved over competing solutions from the literature.

[1]  Anfeng Liu,et al.  Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs , 2015, Comput. Electr. Eng..

[2]  Tao Wang,et al.  QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.

[3]  Yuxin Liu,et al.  Analysis and Improvement of Send-and-Wait Automatic Repeat-reQuest Protocols for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[4]  Anfeng Liu,et al.  An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs , 2015, Comput. J..

[5]  L. Zhou,et al.  Lightweight and effective detection scheme for node clone attack in wireless sensor networks , 2011, IET Wirel. Sens. Syst..

[6]  Wen Tao Zhu Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme , 2011, 2011 International Conference on Network Computing and Information Security.

[7]  Minyi Guo,et al.  Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency , 2016, IEEE Systems Journal.

[8]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[9]  R. J. D'Souza,et al.  Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks , 2012, IEEE Sensors Journal.

[10]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[11]  Anfeng Liu,et al.  A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .

[12]  Sajal K. Das,et al.  Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.

[13]  M. Balakrishnan,et al.  A framework for energy consumption based design space exploration for wireless sensor nodes , 2009, Proceeding of the 13th international symposium on Low power electronics and design (ISLPED '08).

[14]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[15]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[16]  Xiuzhen Cheng,et al.  From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[19]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[20]  Xin Jin,et al.  Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network , 2013, Inf. Sci..

[21]  Yusheng Ji,et al.  An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[22]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[23]  Laurence T. Yang,et al.  Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks , 2014, Comput. Networks.

[24]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[25]  Zhongming Zheng,et al.  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.