Node capture attack detection and defence in wireless sensor networks

Wireless sensor network (WSN) applications are often deployed under hostile environments. Monitoring sensor nodes carefully, detecting and providing defence against malicious activity in the region is a challenging task. Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets and cryptographic keys. This type of attack may result in a severe WSN security breach. Using ‘tamper-resistant’ nodes for securing communication in a WSN cannot be considered as a solution against these attacks as it increases the network cost tremendously. Nevertheless, destroying a legitimate node by erasing its memory and destroying its radio service based on a misjudgement may bring severe damage to the WSN. The authors propose the novel sensor node capture attack detection and defence (SCADD) protocol. SCADD provides a cost-effective solution against the node compromise and capture attacks in WSNs, enhancing the overall WSN security for security-sensitive applications. This protocol consists of two building blocks: node attack detection block and defence advocating measure block. The former provides strategic-based attack detection to eliminate the possibility of misjudgement and the latter uses a self-destruction defence measure against node capture attack, without actually destroying the node's radio service, to avoid a major security breach.

[1]  Eylem Ekici,et al.  Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.

[2]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[3]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[4]  Hamid Sharif,et al.  Image transmissions with security enhancement based on region and path diversity in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[5]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[6]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[7]  Suman Banerjee,et al.  Towards Secure Localization Using Wireless "Congruity' , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[9]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[10]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[11]  Ovidiu Banias,et al.  Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[12]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[14]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[15]  Yuguang Fang,et al.  Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Karl Aberer,et al.  Possibilities for Managing Trust in P2P Networks (EPFL Technical Report IC/2004/84) , 2004 .

[17]  Kang G. Shin,et al.  LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.

[18]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[20]  Sang Ho Lee,et al.  Secure Key Management Protocol in the Wireless Sensor Network , 2006, J. Inf. Process. Syst..

[21]  Wesley E. Snyder,et al.  A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[22]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[23]  Harald Vogt,et al.  Integrity preservation for communication in sensor networks , 2004 .

[24]  Daniel Curiac,et al.  Energy-driven methodology for node self-destruction in wireless sensor networks , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.

[25]  Srdjan Capkun,et al.  SecNav: secure broadcast localization and time synchronization in wireless networks , 2007, MobiCom '07.

[26]  Khaled Elleithy,et al.  Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications , 2007 .