Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

[1]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[2]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[3]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Li-Wei Kang,et al.  Deterministic detection of node replication attacks in sensor networks , 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan.

[6]  Sushil Jajodia,et al.  Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[9]  Meng Wu,et al.  RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks , 2015, KSII Trans. Internet Inf. Syst..

[10]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008 .

[11]  Shirshu Varma,et al.  Distance measurement and error estimation scheme for RSSI based localization in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Wireless Communication and Sensor Networks (WCSN).

[12]  P. Abinaya,et al.  Dynamic detection of node replication attacks using X-RED in wireless sensor networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Labraoui Nabila,et al.  The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.

[15]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[16]  Guo Cheng,et al.  Replication attack detection with monitor nodes in clustered wireless sensor networks , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[17]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[18]  Jonathan Katz,et al.  Aggregate Message Authentication Codes , 1995 .

[19]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[20]  Peng Ning,et al.  A beacon-less location discovery scheme for wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Andrea Zanella,et al.  Experimental comparison of RSSI-based localization algorithms for indoor wireless sensor networks , 2008, REALWSN '08.

[22]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[23]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[24]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[25]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[26]  Sajal K. Das,et al.  Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.

[27]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[28]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[29]  Riccardo Pecori,et al.  S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia , 2016, Comput. Networks.

[30]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[31]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.