Distributed clone detection in wireless sensor networks: An optimization approach

In this paper, we study distributed algorithms for detecting cloned nodes in wireless sensor networks. We consider the impact of leaving undetected cloned nodes in the network, as well as the communication cost and the storage cost incurred by each algorithm. We develop an optimization framework for choosing clone detection parameters based on these costs and analyze existing detection schemes using the developed framework. Simulations are provided to validate the methodology.

[1]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[2]  Sajal K. Das,et al.  On the Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[3]  Guang Gong,et al.  Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[6]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[7]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[9]  Gui-Hai Chen,et al.  The Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks: The Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks , 2009 .

[10]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[11]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.