Detection of Node Capture Attack in Wireless Sensor Networks

Wireless sensor networks (WSNs) deployed in hostile environments for applications such as battle-field surveillance are vulnerable to various attacks, including node capture attack wherein an adversary physically captures, reprograms, and redeploys a node in the network. In this paper, we present a novel approach of program integrity verification (PIV) protocol to detect whether a node is captured. The cluster head equipped with trusted platform module (TPM) verifies by comparing the program memory content of the sensor node before and after capture. The proposed TPM-enabled PIV (TPIV) protocol uses dynamically computed hash-based key and pseudorandom function for detection of a captured node in the network. The security analysis of the TPIV protocol reveals that the probability of a node capture attack victim eluding the PIV and leaking the secret of any noncaptured node is negligible. The proposed TPIV protocol can detect the captured node even in the presence of a strong adversary capable of putting additional memory to elude the PIV. With the results of analytical and experimental comparisons, we show the performance improvement of TPIV protocol in terms of low communication, computation, and storage overhead as compared to the related protocols for PIV in WSN.

[1]  Sanjay Srivastava,et al.  Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network , 2015, ICISS.

[2]  Taekyoung Kwon,et al.  FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.

[3]  Jun-won Ho Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .

[4]  Roberto Di Pietro,et al.  Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..

[5]  Ajay D. Kshemkalyani,et al.  On probabilities of hash value matches , 1998, Comput. Secur..

[6]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[7]  Sung-Ming Yen,et al.  Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[8]  Wen Hu,et al.  A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.

[9]  Ashok K. Turuk,et al.  A comparative analysis of node replica detection schemes in wireless sensor networks , 2016, J. Netw. Comput. Appl..

[10]  Kang G. Shin,et al.  Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks , 2006, SecureComm.

[11]  Rodrigo Roman,et al.  A Novel Key Update Protocol in Mobile Sensor Networks , 2012, ICISS.

[12]  Christoph Krauß,et al.  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.

[13]  Deng Pan,et al.  Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.

[14]  Sumanth Yenduri,et al.  First stage detection of compromised nodes in sensor networks , 2010, 2010 IEEE Sensors Applications Symposium (SAS).

[15]  Jun Zhao,et al.  On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[17]  Kang G. Shin,et al.  Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.