Detecting replicated nodes in Wireless Sensor Networks using random walks and network division

Wireless Sensor Networks are vulnerable to node replication attacks due to deployment in unattended environments and the lack of physical tamper-resistance. An adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of replicas into the network to mount a wide variety of internal attacks. In this paper we propose a novel distributed solution (RAND) for the detection of node replication attack in static WSNs which combines random walks with network division and works in two phases. In the first phase called network configuration phase, the entire network is divided into different areas. In the second phase called replica detection phase, the clone is detected by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Simulation results show that our scheme outperforms the existing witness node based strategies with moderate communication and memory overhead.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[3]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[4]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[5]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[9]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[10]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[11]  Mohamad Naufal bin Mohamad Saad,et al.  Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks , 2013, Int. J. Grid Util. Comput..

[12]  Wazir Zada Khan,et al.  Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[13]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[15]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[16]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[17]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[18]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[19]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[20]  Albert Y. Zomaya,et al.  A framework for real time communication in sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[21]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[22]  Yang Xiang,et al.  Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.