An adaptive stabilizing imposter detection scheme for distributed mobile wireless sensor networks

Abstract Mobile wireless sensor networks (MWSNs) are wireless networks of small sensors moving around a certain coverage area relaying information among themselves and conveying their readings and data to base stations. Imposters are malicious nodes actively engaging other legitimate nodes in the network to read or inject wrong data. MWSN are susceptible to imposter attack and therefore, the protection of MWSN from imposter nodes placed by an adversary to contaminate the sensed data is essential for the reliability of its operation. Imposters detection algorithms need to be distributed in nature and therefore they are susceptible to variety of faults that can perturb the variables for algorithm and cause a major malfunction in the operation of the algorithm and subsequently the entire network if proper recovery mechanisms are not employed. The distributed nature of imposter detection schemes for WSN and the physical environment where the sensors are deployed require some approaches such as stabilization to deal with faults. A stabilizing distributed algorithm can withstand transient faults and start in an arbitrary initial configuration by eventually entering a legitimate system configuration regardless of the current system configuration. We view a fault as a transient fault if it affects the states of the system processes but not their program. In this paper, we propose an imposter detection scheme that can effectively deal with transient faults and arbitrary initialization. In addition, the proposed algorithm effectively adapts to the introduction and the removal of sensor nodes to/from the WSN which makes the proposed algorithm appropriate for practical sensor network applications. Other faults that can occur in the network and in the nodes are beyond the scope of this work.

[1]  Miao Yu,et al.  Mobility Resistant Clustering in Multi-Hop Wireless Networks , 2006, J. Networks.

[2]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[3]  Mehdi Dehghan,et al.  A self-stabilizing clustering algorithm with fault-containment feature for wireless sensor networks , 2014, 7'th International Symposium on Telecommunications (IST'2014).

[4]  Hans P. Muhlfeld,et al.  Cosmic ray soft error rates of 16-Mb DRAM memory chips , 1998, IEEE J. Solid State Circuits.

[5]  Edsger W. Dijkstra,et al.  Self-stabilizing systems in spite of distributed control , 1974, CACM.

[6]  Robert H. Deng,et al.  Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.

[7]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[8]  Sajid Hussain,et al.  Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks , 2009, Defense + Commercial Sensing.

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  Ajoy Kumar Datta,et al.  Optimal snap-stabilizing PIF algorithms in un-oriented trees , 2005, J. High Speed Networks.

[11]  Bechir Hamdaoui,et al.  Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.

[12]  Mehmet Hakan Karaata,et al.  Imposter detection for replication attacks in mobile sensor networks , 2016, Comput. Networks.

[13]  Mazliza Othman,et al.  Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[14]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[15]  Ji Zhang,et al.  A self-stabilizing protocol for minimal weighted dominating sets in arbitrary networks , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[16]  Jacques M. Bahi,et al.  Stabilization and Lifetime Optimization in Distributed Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[17]  Wayne Goddard,et al.  Daemon Conversions in Distributed Self-stabilizing Algorithms , 2013, WALCOM.

[18]  Nidal Nasser,et al.  Cluster-based routing protocol for mobile sensor networks , 2006, QShine '06.

[19]  Fabrizio Grandoni,et al.  Optimal resilient sorting and searching in the presence of memory faults , 2006 .

[20]  Mehmet Hakan Karaata,et al.  Imposter Detection in Mobile Wireless Sensor Networks , 2014 .

[21]  M. Potkonjak,et al.  Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.

[22]  Andrew Berns,et al.  Building self-stabilizing overlay networks with the transitive closure framework , 2011, Theor. Comput. Sci..

[23]  S. Abirami,et al.  In Mobile Sensor Networks Localized Algorithms for Detection of Node Replication Attacks , 2014 .

[24]  Jaap-Henk Hoepman,et al.  Secure and self-stabilizing clock synchronization in sensor networks , 2007, Theor. Comput. Sci..

[25]  Fabrizio Lombardi,et al.  Testing and diagnosis of VLSI and ULSI , 1988 .

[26]  Hirotsugu Kakugawa,et al.  A Dynamic Reconfiguration Tolerant Self-stabilizing Token Circulation Algorithm in Ad-Hoc Networks , 2004, OPODIS.

[27]  Boaz Patt-Shamir,et al.  Self-stabilization by local checking and correction , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[28]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[29]  Ajoy Kumar Datta,et al.  A Self-Stabilizing O(n)-Round k-Clustering Algorithm , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[30]  Chih-Yuan Chen,et al.  Correctness of Self-Stabilizing Algorithms Under the Dolev Model When Adapted to Composite Atomicity Models , 2012, Int. J. Artif. Life Res..

[31]  Joel Antonio Trejo-S'nchez,et al.  A Self-stabilizing Algorithm for the Maximal 2-packing in a Cactus Graph , 2012, IPDPS 2012.