Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks

The forthcoming internet of things - an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of replicas, which may maliciously occupy the network. Thus far, various schemes have been proposed to detect replicas; however, most of them require expensive hardware such as a global positioning system. In general, the ideal price for a sensor node is as low as one dollar, and thus, it is equipped with limited resources; hence, it is not practical to employ additional devices. In this paper, we propose a low-priced and efficient solution for replica detection in static wireless sensor networks. Although the proposed solution does not need any additional hardware, it exhibits similar or better performance, as compared to existing schemes. Through simulation experiments, we show that the proposed solution provides comparable performance in terms of the replica detection ratio and the time required to detect replicas. Furthermore, we show that the proposed solution saves more energy than existing schemes in most of our simulations.

[1]  Christoph P. Mayer Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .

[2]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[3]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[4]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[5]  Karim Tamine,et al.  Active Detection of Node Replication Attacks , 2009 .

[6]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[7]  Guang Gong,et al.  DHT-Based Detection of Node Clone in Wireless Sensor Networks , 2009, ADHOCNETS.

[8]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[9]  Dong Hoon Lee,et al.  Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks , 2013, IEEE Systems Journal.

[10]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[11]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[12]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[13]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[14]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[15]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[16]  Chun-Shien Lu,et al.  Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[17]  Xiuzhen Cheng,et al.  From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[19]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[21]  Fang Liu,et al.  Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[22]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[23]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[24]  Sajal K. Das,et al.  Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.

[25]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[26]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[27]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.