Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks

Wireless sensor networks contain a large number of nodes which are unattended in nature where an adversary can physically capture and compromise the nodes and later inject a range of attacks with these compromised nodes. In order to minimize the damage caused by the compromised nodes, the system should identify and remove them as early as possible. Researchers recently have proposed a number of compromise detection schemes in sensor networks. Trust based schemes are capable of detecting compromised nodes but do not revoke them because of the overhead of false positives. Other methods like software attestation have got overhead in the periodical node attestation. We propose a cluster based node compromise node detection and revocation scheme which reduces the limitations of the existing schemes. In this scheme the concept of Fuzzy logic is used to make a decision over the clusters whether they contain suspicious nodes. After identifying the suspected clusters the software attestation is performed against the nodes which lead to the identification and revocation of compromised nodes from the network. Our proposed scheme shows that it performs well in the presence of false positives and false negatives.

[1]  Jin-Shyan Lee,et al.  Fuzzy-Logic-Based Clustering Approach for Wireless Sensor Networks Using Energy Predication , 2012, IEEE Sensors Journal.

[2]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[3]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[4]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[7]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[8]  DaeHun Nyang,et al.  Software-Based Remote Code Attestation in Wireless Sensor Network , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[10]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[11]  Sencun Zhu,et al.  Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[12]  Kang G. Shin,et al.  Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.