Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

[1]  Roberto Di Pietro,et al.  Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..

[2]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[3]  Chun-Shien Lu,et al.  Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Xiuzhen Cheng,et al.  From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[6]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[7]  Deepika Kukreja,et al.  Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs , 2014, ISI.

[8]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[9]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[10]  Chang Zhou,et al.  An Two Dimension detection to node replication attacks in mobile sensor networks , 2016, 2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).

[11]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[12]  Chen Xing-tian Routing Selection for Wide-area Protection Based on Communication Reliability and Time-delay Requirement , 2011 .

[13]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[14]  M.J. Ryan,et al.  Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks , 2009, IEEE Journal of Oceanic Engineering.

[15]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[16]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .