MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks

Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replicas back into the network for further malicious activities. Although a number of protocols have been proposed to tackle such node replication attacks, few of these schemes are suitable for mobile wireless sensor networks. In this paper, we propose two novel mobility-assisted distributed solutions to node replication detection in mobile wireless sensor networks. In both protocols, after receiving the time-location claims, witnesses carry these claims around the network instead of transmitting them. That means data are forwarded only when appropriate witnesses encounter each other. Unary-Time-Location Storage & Exchange (UTLSE) detects the replicas by each of the two encountered witnesses which stores only one time-location claim. Multi-Time-Location Storage & Diffusion (MTLSD), by storing more time-location claims for each tracked node and introducing time-location claims diffusion among witnesses, provides excellent resiliency and sub-optimal detection probability with modest communication overhead. Due to the mobility-assisted property, our protocols do not rely on any specific routing protocol, which makes them suitable for various mobile settings. Our theoretical analysis and simulation results show that our protocols are efficient in terms of detection performance, communication overhead and storage overhead.

[1]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[4]  Hannes Hartenstein,et al.  Stochastic properties of the random waypoint mobility model: epoch length, direction distribution, and cell change rate , 2002, MSWiM '02.

[5]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[6]  Erchin Serpedin,et al.  A New Approach for Time Synchronization in Wireless Sensor Networks: Pairwise Broadcast Synchronization , 2008, IEEE Transactions on Wireless Communications.

[7]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[8]  David Evans,et al.  Localization for mobile sensor networks , 2004, MobiCom '04.

[9]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[10]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[11]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[12]  Shigeng Zhang,et al.  SecMCL: A Secure Monte Carlo Localization algorithm for mobile sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[13]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[14]  Peng Ning,et al.  Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[16]  Tracy Camp,et al.  Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.

[17]  Cauligi S. Raghavendra,et al.  Performance analysis of mobility-assisted routing , 2006, MobiHoc '06.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Chunming Qiao,et al.  Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.

[20]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[21]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[22]  Peng Ning,et al.  ShortPK: A short-term public key scheme for broadcast authentication in sensor networks , 2009, TOSN.

[23]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.