The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2012 vol.9)
pp: 494-510
Jun-Won Ho , Seoul Women's University, Seoul
Matthew Wright , The University of Texas at Arlington, Arlington
Sajal K. Das , The University of Texas at Arlington, Arlington
ABSTRACT
Due to the unattended nature of wireless sensor networks, an adversary can physically capture and compromise sensor nodes and then mount a variety of attacks with the compromised nodes. To minimize the damage incurred by the compromised nodes, the system should detect and revoke them as soon as possible. To meet this need, researchers have recently proposed a variety of node compromise detection schemes in wireless ad hoc and sensor networks. For example, reputation-based trust management schemes identify malicious nodes but do not revoke them due to the risk of false positives. Similarly, software-attestation schemes detect the subverted software modules of compromised nodes. However, they require each sensor node to be attested periodically, thus incurring substantial overhead. To mitigate the limitations of the existing schemes, we propose a zone-based node compromise detection and revocation scheme in wireless sensor networks. The main idea behind our scheme is to use sequential hypothesis testing to detect suspect regions in which compromised nodes are likely placed. In these suspect regions, the network operator performs software attestation against sensor nodes, leading to the detection and revocation of the compromised nodes. Through quantitative analysis and simulation experiments, we show that the proposed scheme detects the compromised nodes with a small number of samples while reducing false positive and negative rates, even if a substantial fraction of the nodes in the zone are compromised. Additionally, we model the detection problem using a game theoretic analysis, derive the optimal strategies for the attacker and the defender, and show that the attacker's gain from node compromise is greatly limited by the defender when both the attacker and the defender follow their optimal strategies.
INDEX TERMS
Node compromise detection, sequential analysis.
CITATION
Jun-Won Ho, Matthew Wright, Sajal K. Das, "ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 4, pp. 494-510, July-Aug. 2012, doi:10.1109/TDSC.2011.65
REFERENCES
[1] T. Abuhmed, N. Nyamaa, and D. Nyang, “Software-Based Remote Code Attestation in Wireless Sensor Network,” Proc. IEEE GLOBECOM, Dec. 2009.
[2] S. Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.
[3] T.M. Cover and J.A. Thomas, Elements of Information Theory. Wiley-Interscience, 2006.
[4] F. Delgosha and F. Fekri, “Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme,” Proc. IEEE INFOCOM, Apr. 2006.
[5] W. Du, J. Deng, Y.S. Han, S. Chen, and P. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. IEEE INFOCOM, pp. 586-597, Mar. 2004.
[6] S. Ganeriwal and M. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), Oct. 2004.
[7] J. Ho, M. Wright, and S.K. Das, “Fast Detection of Replica Node Attacks in Sensor Networks Using Sequential Analysis,” Proc. IEEE INFOCOM, Apr. 2009.
[8] J. Ho, M. Wright, and S.K. Das, “ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis,” Proc. IEEE Symp. Reliable Distributed Systems (SRDS), Sept. 2009.
[9] X. Hu, T. Park, and K.G. Shin, “Attack-Tolerant Time-Synchronization in Wireless Sensor Networks,” Proc. IEEE INFOCOM, Apr. 2008.
[10] J. Jung, V. Paxon, A.W. Berger, and H. Balakrishnan, “Fast Port Scan Detection Using Sequential Hypothesis Testing,” Proc. IEEE Symp. Security and Privacy (S&P), May 2004.
[11] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proc. IEEE Workshop Sensor Network Protocols and Applications, May 2003.
[12] D. Knuth, The Art of Computer Programming, third ed., vol. 2, pp. 145-146. Addison-Wesley, 1998.
[13] F. Li and J. Wu, “Mobility Reduces Uncertainty in {MANET},” Proc. IEEE INFOCOM, May 2007.
[14] Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN), Apr. 2005.
[15] T. Park and K.G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 3, pp. 297-309, May/June 2005.
[16] B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symp. Security and Privacy (S&P), May 2005.
[17] A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, “SWATT: SoftWare-Based Attestation for Embedded Devices,” Proc. IEEE Symp. Security and Privacy (S&P), May 2004.
[18] K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, “TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS), Oct. 2006.
[19] Y. Sun, Z. Han, W. Yu, and K. Liu, “A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks,” Proc. IEEE INFOCOM, Apr. 2006.
[20] G. Theodorakopoulos and J.S. Baras, “Game Theoretic Modeling of Malicious Users in Collaborative Networks,” IEEE J. Selected Areas in Comm., vol. 26, no. 7, pp. 1317-1326, Sept. 2008.
[21] D. Wagner, “Resilient Aggregation in Sensor Networks,” Proc. ACM Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), 2004.
[22] A. Wald, Sequential Analysis. Dover Publications, 2004.
[23] Y. Yang, X. Wang, S. Zhu, and G. Cao, “Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks,” Proc. IEEE 26th Int'l Symp. Reliable Distributed Systems (SRDS), Oct. 2007.
[24] F. Ye, G. Zhong, S. Lu, and L. Zhang, “A Robust Data Delivery Protocol for Large Scale Sensor Networks,” Proc. Second Int'l Conf. Information Processing in Sensor Networks (IPSN), Apr. 2003.
[25] F. Ye, H. Yang, and Z. Liu, “Catching ‘Moles’ in Sensor Networks,” Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS), June 2007.
[26] W. Zhang, M. Tran, S. Zhu, and G. Cao, “A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks,” Proc. ACM Mobihoc, Sept. 2007.
[27] Y. Zhang, J. Yang, L. Jin, and W. Li, “Locating Compromised Sensor Nodes through Incremental Hashing Authentication,” Proc. Int'l Conf. Distributed Computing in Sensor Systems (DCOSS), June 2006.
42 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool