COMPUTER SCIENCE AND TECHNOLOGY |
|
|
|
|
|
Single-witness-based distributed detection for node replication attack |
MA Rui1, ZHU Tianbao1, MA Ke2, HU Changzhen1, ZHAO Xiaolin1 |
1. Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China;
2. Internet Center, Institute of Communication Standard Research, China Academy of Information and Communication Technology, Beijing 100191, China |
|
|
Abstract Existing approaches for detecting node replication attacks in wireless sensor networks have low detection rates, high communication costs and high memory costs. This paper presents a single-witness-based distributed detection (SWDD) method to node replication attacks. This method consists of 5 steps:selecting a witness node, generating the declaration information, sending the declaration information, verifying the witness nodes, and detecting the replication node. The method has a single witness node selection mechanism, uses random numbers to describe the node location, verifies the witness nodes using a multiple mapping mechanism and finally detects the replication nodes by the ultimate witness node. Simulations on OMNeT++ comparing this method with the single deterministic cell (SDC) and parallel multiple probabilistic cells (P-MPC) methods show that the SWDD method has a better detection rate, less communications and less energy consumption.
|
Keywords
wireless sensor network
node replication attack
distributed detection
single witness node
multiple mapping mechanism
|
|
Issue Date: 15 September 2017
|
|
|
[1] |
任丰原, 黄海宁, 林闯. 无线传感器网络[J]. 软件学报, 2003, 14(7):1282-1291.REN Fengyuan, HUANG Haining, LIN Chuang. Wireless sensor networks[J]. Journal of Software, 2003, 14(7):1282-1291.(in Chinese)
|
[2] |
Akyildiz I F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communication Magazine, 2002, 40(8):102-114.
|
[3] |
Alwan H, Agarwal A. A survey on fault tolerant routing techniques in wireless sensor networks[C]//Sensor Technologies and Applications. Athens, Greece:IEEE Press, 2009:366-371.
|
[4] |
Jiang C, Yuan D, Zhao Y. Towards clustering algorithms in wireless sensor networks-A survey[C]//Wireless Communication and Networking Conference. Budapest, Hungary:IEEE Press, 2009:1-6.
|
[5] |
徐军. 无线传感器网络恶意节点攻击若干问题研究[D]. 合肥:中国科技技术大学, 2012. XU Jun. Research on Malicious Node Attacks in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2012.(in Chinese)
|
[6] |
Becher A, Benenson Z, Dornseif M. Tampering with motes:Real-world physical attacks on wireless sensor networks[C]//Security in Pervasive Computing. New York, NY, USA:Springer Berlin Heidelberg, 2006:104-118.
|
[7] |
Sathish R, Kumar D R. Proficient algorithms for replication attack detection in wireless sensor networks-A survey[C]//Emerging Trends in Computing, Communication and Nanotechnology. Chennai, India:IEEE Press, 2013:2336-2341.
|
[8] |
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks[C]//Symposium on Security & Privacy. Oakland, CA, USA:IEEE Press, 2005:49-63.
|
[9] |
Choi H, Zhu S, La Porta T F. SET:Detecting node clones in sensor networks[C]//Security and Privacy in Communications Networks and the Workshops. Nice, France:IEEE Press, 2007:341-350.
|
[10] |
周晖, 朱立庆, 杨振, 等. 基于分簇的节点复制攻击入侵检测方法[J]. 传感器与微系统, 2014, 33(5):129-131.ZHOU Hui, ZHU Liqing, YANG Zhen, et al. Cluster-based detection method against node replication attack[J]. Transducer and Microsystem Technologies, 2014, 33(5):129-131.(in Chinese)
|
[11] |
Brooks R, Govindaraju P Y, Pirretti M, et al. On the detection of clones in sensor networks using random key predistribution[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2007, 37(6):1246-1258.
|
[12] |
Xing K, Liu F, Cheng X, et al. Real-time detection of clone attacks in wireless sensor networks[C]//Distributed Computing Systems. Beijing, China:IEEE Press, 2008:3-10.
|
[13] |
Ho J W, Wright M, Das S K. Fast detection of replica node attacks in mobile sensor networks using sequential analysis[C]//Computer Communications. Rio de Aneiro, Brazil:IEEE Press, 2009:1773-1781.
|
[14] |
Bekara C, Laurent-Maknavicius M. A new protocol for securing wireless sensors networks against nodes replication attacks[C]//Wireless and Mobile Computing Networking and Communications. New York, NY, USA:IEEE Press, 2007:59-65.
|
[15] |
Conti M, Pietro R D, Mancini L V, et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[C]//ACM International Symposium on Mobile Ad Hoc Networking and Computing. Montreal, Quebec, Canada:ACM, 2007:80-89.
|
[16] |
Zhu B, Addada V G K, Setia S, et al. Efficient distributed detection of node replication attacks in sensor networks[C]//Computer Security Applications Conference. Miami Beach, FL, USA:IEEE Press, 2007:257-267.
|
[17] |
周豫萍, 黄振杰, 王娟等. 一类新的分布式随机验证无线传感网络节点克隆攻击检测[J]. 传感技术学报, 2014, 27(4):544-550.ZHOU Yuping, HUANG Zhenjie, WANG Juan, et al. Node clone attacks detection based on distributed random verification in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2014, 27(4):544-550. (in Chinese)
|
[18] |
Meng X, Lin K, Li K. A node-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networks[C]//Algorithms and Architectures for Parallel Processing. Busan, Korea:Springer Berlin Heidelberg, 2010:559-570.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|