skip to main content
10.1145/1516241.1516340acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Reporter node determination of replicated node detection in wireless sensor networks

Published: 15 February 2009 Publication History

Abstract

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

References

[1]
D. Boneh, C. Gentry, and M. Hamburg. Space-efficient identity based encryptionwithout pairings. In IEEE FOCS, pp. 647--657, 2007.
[2]
J. Bruck, J. Gao, and A. A. Jiang. Localization and routing in sensor networks by local angle information. In ACM MOBIHOC, pp. 181--192, 2005.
[3]
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In INFOCOM, pp. 1917--1928, 2005.
[4]
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pp. 197--213, 2003.
[5]
M. Conti, R. Di Pietro, L. Mancini, and A. Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In ACM MobiHoc, pp. 80--89, 2007.
[6]
M. Conti, R. D. Pietro, and L. V. Mancini. Secure cooperative channel establishment inwireless sensor networks. In IEEE PERCOMW, pp. 327--331, 2006.
[7]
B. Deb, S. Bhatnagar, and B. Nath. Reinform: Reliable information forwarding using multiple paths in sensor networks. In 28th IEEE LCN, p. 406, 2003.
[8]
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004.
[9]
E. Ekici, J. McNair, and D. Al-Abri. Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw., 6(2):195--209, 2008.
[10]
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. SIGMOBILE Mob. Comput. Commun. Rev., 5(4):11--25, 2001.
[11]
B. Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM, pp. 243--254, 2000.
[12]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MOBICOM, pp. 255--265, 2000.
[13]
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In ACM IPSN, pp. 259--268, 2004.
[14]
P. Ning, A. Liu, and W. Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1):1--35, 2008.
[15]
B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE S&P, pp. 49--63, 2005.
[16]
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84 on Advances in cryptology, pp. 47--53, 1985.
[17]
R. Stoleru, P. Vicaire, T. He, and J. A. Stankovic. Stardust: A flexible architecture for passive localization in wireless sensor networks. In ACM SENSYS, pp. 57--70, 2006.
[18]
G. Wang, W. Zhang, G. Cao, and T. Porta. On supporting distributed collaboration in sensor networks. In IEEE MILCOM, 2003.
[19]
Y. Wei, Z. Yu, and Y. Guan. Location verification algorithms forwireless sensor networks. In IEEE ICDCS, p. 70, Washington, DC, USA, 2007. IEEE Computer Society.
[20]
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54--62, 2002.
[21]
H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261--273, 2006.
[22]
B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy. Efficient distributed detection of node replication attacks in sensor networks. In IEEE ACSAC, pp. 257--267, 2007.

Cited By

View all
  • (2014)Node coloring based replica detection technique in wireless sensor networksWireless Networks10.1007/s11276-014-0751-920:8(2419-2435)Online publication date: 1-Nov-2014
  • (2012)ReviewJournal of Network and Computer Applications10.1016/j.jnca.2012.01.00235:3(1022-1034)Online publication date: 1-May-2012
  • (2010)A note-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networksProceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I10.1007/978-3-642-13119-6_49(559-570)Online publication date: 21-May-2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. algorithm
  2. node compromising attack
  3. node replication attack
  4. security
  5. wireless sensor networks

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Node coloring based replica detection technique in wireless sensor networksWireless Networks10.1007/s11276-014-0751-920:8(2419-2435)Online publication date: 1-Nov-2014
  • (2012)ReviewJournal of Network and Computer Applications10.1016/j.jnca.2012.01.00235:3(1022-1034)Online publication date: 1-May-2012
  • (2010)A note-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networksProceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I10.1007/978-3-642-13119-6_49(559-570)Online publication date: 21-May-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media