Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme

We consider the node replication attack, which is an application-independent attack unique to wireless sensor networks. The attack makes it possible for an adversary to prepare her own low-cost sensor nodes and induce the network to accept them as legitimate ones. To do so, the adversary only needs to physically capture one node, reveal its secret credentials, replicate the node in large quantity, and deploy these malicious nodes back into the network so as to subvert the network with little effort. Recently, Ko et al. proposed a neighbor-based detection scheme to cope with replication attacks. The scheme features distributed detection and takes node mobility into account. It harnesses the dynamic observations of the neighbors of a claimer node and avoids the protocol iterations typically found in distributed detections. Unfortunately, we show that their proposal is subject to various replication attacks that can circumvent the detection. Moreover, it is even possible for a sophisticated adversary to exploit the protocol to revoke legitimate nodes.

[1]  Hung-Yuan Chen,et al.  A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[2]  Keqiu Li,et al.  A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks , 2010, ICA3PP.

[3]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[6]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[7]  Stefan Ruhrup,et al.  Theory and Practice of Geographic Routing , 2009 .