Imposter detection for replication attacks in mobile sensor networks

In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.

[1]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[2]  Chun-Shien Lu,et al.  Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[3]  Jian Ma,et al.  Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[4]  Mehmet Hakan Karaata,et al.  Imposter Detection in Mobile Wireless Sensor Networks , 2014 .

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[7]  Nidal Nasser,et al.  Cluster-based routing protocol for mobile sensor networks , 2006, QShine '06.

[8]  Miao Yu,et al.  Mobility Resistant Clustering in Multi-Hop Wireless Networks , 2006, J. Networks.

[9]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[10]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[11]  Tassos Dimitriou,et al.  Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.

[12]  Robert H. Deng,et al.  Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.

[13]  Bechir Hamdaoui,et al.  Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.

[14]  A. Tsourdos,et al.  Contaminant Cloud Boundary Monitoring Using Network of UAV Sensors , 2008, IEEE Sensors Journal.

[15]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[16]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[17]  Mazliza Othman,et al.  Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[18]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[19]  Tassos Dimitriou,et al.  Spy-Sense: spyware tool for executing stealthy exploits against sensor networks , 2013, HotWiSec '13.

[20]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[21]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[22]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[23]  Sajid Hussain,et al.  Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks , 2009, Defense + Commercial Sensing.