The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2010 vol.9)
pp: 913-926
Bo Zhu , Concordia University, Montreal
Sanjeev Setia , George Mason University, Fairfax
Sushil Jajodia , George Mason University, Fairfax
Sankardas Roy , George Mason University, Fairfax
Lingyu Wang , Concordia University, Montreal
ABSTRACT
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these replicas can be used to launch a variety of attacks that undermine many sensor applications and protocols. In this paper, we present a novel distributed approach called Localized Multicast for detecting node replication attacks. The efficiency and security of our approach are evaluated both theoretically and via simulation. Our results show that, compared to previous distributed approaches proposed by Parno et al., Localized Multicast is more efficient in terms of communication and memory costs in large-scale sensor networks, and at the same time achieves a higher probability of detecting node replicas.
INDEX TERMS
Wireless sensor networks security, node replication attack detection, distributed protocol, efficiency.
CITATION
Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang, "Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks", IEEE Transactions on Mobile Computing, vol.9, no. 7, pp. 913-926, July 2010, doi:10.1109/TMC.2010.40
REFERENCES
[1] H. Choi, S. Zhu, and T.F. La Porta, "SET: Detecting Node Clones in Sensor Networks," Proc. Third Int'l Conf. Security and Privacy in Comm. Networks (SecureComm) 2007.
[2] M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, 2007.
[3] J.R. Douceur, "The Sybil Attack," Proc. First Int'l Workshop Peer-to-Peer Systems (IPTPS '02), pp. 251-260, 2002.
[4] L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security, pp. 41-47, 2002.
[5] G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public Key Cryptography in Sensor Networks-Revisited," Proc. First European Workshop Security in Ad-Hoc and Sensor Networks (ESAS '04), pp. 2-18, 2004.
[6] F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," Proc. Ninth Ann. Int'l Workshop Selected Areas in Cryptography (SAC '02), pp. 310-324, 2002.
[7] B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM MobiCom, pp. 243-254, 2000.
[8] Y.-B. Ko, J.-M. Choi, and J.-H. Kim, "A New Directional Flooding Protocol for Wireless Sensor Networks," Proc. Int'l Conf. Information Networking (ICOIN '04), pp. 93-102, 2004.
[9] T.J. Kwon and M. Gerla, "Efficient Flooding with Passive Clustering (PC) in Ad Hoc Networks," ACM SIGCOMM Computer Comm. Rev., vol. 32, no. 1, pp. 44-56, 2002.
[10] H. Lim and C. Kim, "Flooding in Wireless Ad Hoc Networks," Computer Comm., vol. 24, nos. 3/4, pp. 353-363, 2000.
[11] D.J. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. IEEE Conf. Sensor and Ad Hoc Comm. and Networks (SECON), pp. 71-80, 2004.
[12] S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, 2000.
[13] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), pp. 259-268, 2004.
[14] B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P '05), pp. 49-63, 2005.
[15] S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: A Geographic Hash Table for Data-Centric Storage," Proc. First ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA), pp. 78-87, 2002.
[16] H. Sabbineni and K. Chakrabarty, "Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks," IEEE Trans. Computers, vol. 54, no. 1, pp. 36-46, Jan. 2005.
[17] A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT: SoftWare-Based ATTestation for Embedded Devices," Proc. IEEE Symp. Security and Privacy (S&P '04), pp. 272-282, 2004.
[18] B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. 23rd Ann. Computer Security Applications Conf. (ACSAC '07), 2007.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool