A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks

One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated and its efficiency is evaluated in terms of probability of detecting replica nodes. Experiment results show that the proposed algorithm has favorable performance in detection of replica nodes.

[1]  Deborah Estrin,et al.  GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.

[2]  Chun-Shien Lu,et al.  Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network , 2020 .

[3]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[4]  Hyunsoo Yoon,et al.  A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks , 2009, FGIT-FGCN.

[5]  Xiaoming Deng,et al.  A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks , 2011, Journal of Computer Science and Technology.

[6]  Mohammad Reza Meybodi,et al.  A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..

[7]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[8]  Sajal K. Das,et al.  Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.

[9]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[10]  Shengli Liu,et al.  Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks , 2012 .

[11]  Chun-Shien Lu,et al.  Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[12]  Maryline Laurent-Maknavicius,et al.  A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).

[13]  Robert H. Deng,et al.  Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.

[14]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[15]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[16]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[17]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[18]  Mojtaba Jamshidi,et al.  A Three-level Propagation Method of Routing Packets Specialized for Underwater Wireless Sensor Networks , 2016 .

[19]  Mohammad Reza Meybodi,et al.  Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes , 2018 .

[20]  Roberto Di Pietro,et al.  Wireless Sensor Replica Detection in Mobile Environments , 2012, ICDCN.

[21]  P. N. Chatur,et al.  Detailed Survey on Attacks in Wireless Sensor Network , 2017 .

[22]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[23]  W.K.G. Seah,et al.  Multipath Virtual Sink Architecture for Underwater Sensor Networks , 2006, OCEANS 2006 - Asia Pacific.

[24]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[25]  Sushil Jajodia,et al.  Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[26]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.