Lightweight and effective detection scheme for node clone attack in wireless sensor networks

Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets, cryptographic keys and so on. The adversary can easily launch node clone attack, which is an attack that an adversary attempts to add one or more nodes to the network by cloning captured nodes. This kind of attack imposes a severe threat to wireless sensor networks (WSNs). A novel scheme to detect the node clone attack in WSN by channel identification characteristic is presented, in which the clone nodes are distinguished by the channel responses between nodes. The proposed scheme aims at achieving fast detection and minimising the data transmission cost by taking advantage of temporal and spatial uniqueness in physical layer channel responses. In contrast to previous solutions, the proposed approaches feature nearly-perfect resilience to node clone attack with low communication and computation costs, low memory requirements and high detection probability.

[1]  A. Yasinsac,et al.  Ad hoc network security: peer identification and authentication using signal properties , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[2]  Patrick Robertson,et al.  Pilot-symbol-aided channel estimation in time and frequency , 1997 .

[3]  Geoffrey Ye Li,et al.  Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..

[4]  P. Bello Characterization of Randomly Time-Variant Linear Channels , 1963 .

[5]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[6]  Guang Gong,et al.  Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..

[7]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Hong Wen,et al.  Build-in wiretap channel I with feedback and LDPC codes , 2009, Journal of Communications and Networks.

[9]  Erik G. Larsson,et al.  Joint symbol timing and channel estimation for OFDM based WLANs , 2001, IEEE Communications Letters.

[10]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[11]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[13]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[14]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.