Single-witness-based distributed detection for node replication attack
MA Rui1, ZHU Tianbao1, MA Ke2, HU Changzhen1, ZHAO Xiaolin1
1. Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China;
2. Internet Center, Institute of Communication Standard Research, China Academy of Information and Communication Technology, Beijing 100191, China
Abstract:Existing approaches for detecting node replication attacks in wireless sensor networks have low detection rates, high communication costs and high memory costs. This paper presents a single-witness-based distributed detection (SWDD) method to node replication attacks. This method consists of 5 steps:selecting a witness node, generating the declaration information, sending the declaration information, verifying the witness nodes, and detecting the replication node. The method has a single witness node selection mechanism, uses random numbers to describe the node location, verifies the witness nodes using a multiple mapping mechanism and finally detects the replication nodes by the ultimate witness node. Simulations on OMNeT++ comparing this method with the single deterministic cell (SDC) and parallel multiple probabilistic cells (P-MPC) methods show that the SWDD method has a better detection rate, less communications and less energy consumption.
Akyildiz I F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communication Magazine, 2002, 40(8):102-114.
[3]
Alwan H, Agarwal A. A survey on fault tolerant routing techniques in wireless sensor networks[C]//Sensor Technologies and Applications. Athens, Greece:IEEE Press, 2009:366-371.
[4]
Jiang C, Yuan D, Zhao Y. Towards clustering algorithms in wireless sensor networks-A survey[C]//Wireless Communication and Networking Conference. Budapest, Hungary:IEEE Press, 2009:1-6.
[5]
徐军. 无线传感器网络恶意节点攻击若干问题研究[D]. 合肥:中国科技技术大学, 2012. XU Jun. Research on Malicious Node Attacks in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2012.(in Chinese)
[6]
Becher A, Benenson Z, Dornseif M. Tampering with motes:Real-world physical attacks on wireless sensor networks[C]//Security in Pervasive Computing. New York, NY, USA:Springer Berlin Heidelberg, 2006:104-118.
[7]
Sathish R, Kumar D R. Proficient algorithms for replication attack detection in wireless sensor networks-A survey[C]//Emerging Trends in Computing, Communication and Nanotechnology. Chennai, India:IEEE Press, 2013:2336-2341.
[8]
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks[C]//Symposium on Security & Privacy. Oakland, CA, USA:IEEE Press, 2005:49-63.
[9]
Choi H, Zhu S, La Porta T F. SET:Detecting node clones in sensor networks[C]//Security and Privacy in Communications Networks and the Workshops. Nice, France:IEEE Press, 2007:341-350.
[10]
周晖, 朱立庆, 杨振, 等. 基于分簇的节点复制攻击入侵检测方法[J]. 传感器与微系统, 2014, 33(5):129-131.ZHOU Hui, ZHU Liqing, YANG Zhen, et al. Cluster-based detection method against node replication attack[J]. Transducer and Microsystem Technologies, 2014, 33(5):129-131.(in Chinese)
[11]
Brooks R, Govindaraju P Y, Pirretti M, et al. On the detection of clones in sensor networks using random key predistribution[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2007, 37(6):1246-1258.
[12]
Xing K, Liu F, Cheng X, et al. Real-time detection of clone attacks in wireless sensor networks[C]//Distributed Computing Systems. Beijing, China:IEEE Press, 2008:3-10.
[13]
Ho J W, Wright M, Das S K. Fast detection of replica node attacks in mobile sensor networks using sequential analysis[C]//Computer Communications. Rio de Aneiro, Brazil:IEEE Press, 2009:1773-1781.
[14]
Bekara C, Laurent-Maknavicius M. A new protocol for securing wireless sensors networks against nodes replication attacks[C]//Wireless and Mobile Computing Networking and Communications. New York, NY, USA:IEEE Press, 2007:59-65.
[15]
Conti M, Pietro R D, Mancini L V, et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[C]//ACM International Symposium on Mobile Ad Hoc Networking and Computing. Montreal, Quebec, Canada:ACM, 2007:80-89.
[16]
Zhu B, Addada V G K, Setia S, et al. Efficient distributed detection of node replication attacks in sensor networks[C]//Computer Security Applications Conference. Miami Beach, FL, USA:IEEE Press, 2007:257-267.
[17]
周豫萍, 黄振杰, 王娟等. 一类新的分布式随机验证无线传感网络节点克隆攻击检测[J]. 传感技术学报, 2014, 27(4):544-550.ZHOU Yuping, HUANG Zhenjie, WANG Juan, et al. Node clone attacks detection based on distributed random verification in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2014, 27(4):544-550. (in Chinese)
[18]
Meng X, Lin K, Li K. A node-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networks[C]//Algorithms and Architectures for Parallel Processing. Busan, Korea:Springer Berlin Heidelberg, 2010:559-570.