The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2011 vol.10)
pp: 767-782
Matthew Wright , University of Texas at Arlington, Arlington
Sajal K. Das , University of Texas at Arlington, Arlington
ABSTRACT
Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust manner at the cost of reasonable overheads.
INDEX TERMS
Replica detection, sequential analysis, mobile sensor networks, security.
CITATION
Matthew Wright, Sajal K. Das, "Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing", IEEE Transactions on Mobile Computing, vol.10, no. 6, pp. 767-782, June 2011, doi:10.1109/TMC.2010.213
REFERENCES
[1] J.-Y.L. Boudec and M. Vojnović, "Perfect Simulation and Stationary of a Class of Mobility Models," Proc. IEEE INFOCOM, pp. 2743-2754, Mar. 2005.
[2] S. Čapkun and J.P. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.
[3] M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.
[4] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G.S. Sukhatme, "Robomote: Enabling Mobility in Sensor Networks," Proc. Fourth IEEE Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.
[5] J. Ho, M. Wright, and S.K. Das, "Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis," Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.
[6] J. Ho, D. Liu, M. Wright, and S.K. Das, "Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.
[7] L. Hu and D. Evans, "Localization for Mobile Sensor Networks," Proc. ACM MobiCom, pp. 45-57, Sept. 2004.
[8] J. Jung, V. Paxon, A.W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, pp. 211-225, May 2004.
[9] A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Proc. Seventh IEEE Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 245-256, Apr. 2008.
[10] S. PalChaudhuri, J.-Y.L. Boudec, and M. Vojnović, "Perfect Simulations for Random Trip Mobility Models," Proc. 38th Ann. Simulation Symp., Apr. 2005.
[11] B. Parno, A. Perrig, and V.D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.
[12] H. Song, S. Zhu, and G. Cao, "Attack-Resilient Time Synchronization for Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.
[13] K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," Proc. 13th ACM Conf. Computer and Comm. Security (CCS), pp. 264-271, Oct. 2006.
[14] G. Theodorakopoulos and J.S. Baras, "Game Theoretic Modeling of Malicious Users in Collaborative Networks," IEEE J. Selected Areas in Comm., vol. 26, no. 7, pp. 1317-1326, Sept. 2008.
[15] A. Wald, Sequential Analysis. Dover, 2004.
[16] H. Wang, B. Sheng, C.C. Tan, and Q. Li, "Comparing Symmetric-Key and Public-Key Based Security Schemes in Sensor Networks: A Case Study of User Access Control," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), pp. 11-18, June 2008.
[17] K. Xing, F. Liu, X. Cheng, and H.C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
[18] C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks," Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept. 2009.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool