Advertisement

Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks

  • Mojtaba JamshidiEmail author
  • Mehdi Esnaashari
  • Aso Mohammad Darwesh
  • Mohammad Reza Meybodi
Article
  • 20 Downloads

Abstract

Node replication attack is one of the well-known and dangerous attacks against Wireless Sensor Networks (WSNs) in which adversary enters the network, searches randomly and captures one or multiple normal nodes. Adversary extracts data and keying materials of the captured node and generates several copies of that node and deploys them in the network. In this paper, a novel algorithm using watchdog nodes is proposed to detect replica nodes in mobile WSNs. The main idea of the proposed algorithm is inspired by maximum predefined speed for sensor nodes and using time-location tags by the watchdog nodes to detect replica nodes. Watchdog nodes collaborate to measure sensor nodes’ speed in the environment and if they find that a node moves faster than a predefined threshold, they mark it as a malicious node, because such replica node in different regions of the network is moving faster than usual in different regions of the network. The proposed algorithm is implemented by J-SIM simulator and its performance is evaluated in terms of false detection and true detection rates through some experiments. Experiment results show that the proposed algorithm is able to detect 100% of replica nodes, while the false detection rate is less than 0.5%.

Keywords

Mobile Wireless Sensor Network Replication attack Replica nodes Time-location tags Watchdog nodes 

Notes

References

  1. 1.
    M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it, Wireless Personal Communications, Vol. 105, No. 1, pp. 145–173, 2019.CrossRefGoogle Scholar
  2. 2.
    M. R. Alagheband and M. R. Aref, Dynamic and secure key management model for hierarchical heterogeneous sensor networks, IET Information Security, Vol. 6, No. 4, pp. 271–280, 2012.CrossRefGoogle Scholar
  3. 3.
    M. Jamshidi, M. Ranjbari, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A new algorithm to defend against sybil attack in static wireless sensor networks using mobile observer sensor nodes, Adhoc & Sensor Wireless Networks, Vol. 43, pp. 213–238, 2019.Google Scholar
  4. 4.
    C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad hoc Networks, Vol. 1, pp. 299–302, 2003.CrossRefGoogle Scholar
  5. 5.
    B. Parno, A. Perrig, V. D. Gligor, Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 2005.Google Scholar
  6. 6.
    M. Conti, R. D. Pietro, L. V. Mancini, A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the ACM MobiHoc, 2007.Google Scholar
  7. 7.
    M. Conti, R. D. Pietro, L. V. Mancini, A. Mei, Distributed detection of clone attacks in wireless sensor networks. In Proceedings of the IEEE Transactions on Depedable and Secure Computing, 2010.Google Scholar
  8. 8.
    H. Choi, S. Zhu, T. F. Porta, SET. detecting node clones in sensor networks. In Proceedings of the SecureComm, 2007. pp. 341–350.Google Scholar
  9. 9.
    B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2007.Google Scholar
  10. 10.
    C. Kim, C. Park, J. Hur, H. Lee and H. Yoon, A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks, Communications in Computer and Information Science, Vol. 56, pp. 405–412, 2009.CrossRefGoogle Scholar
  11. 11.
    Y. Zeng, J. Cao, S. Zhang, S. Guo and L. Xie, Random-walk based approach to detect clone attacks in wireless sensor networks, IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, pp. 677–691, 2010.CrossRefGoogle Scholar
  12. 12.
    C. M. Yu, C. S. Lu, S. Y. Kuo, CSI: compressed sensing-based clone identification in sensor networks. In Proceedings of the 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, 2012.Google Scholar
  13. 13.
    M. Zhang et al., Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of the 17th annual IEEE International Conference on Network Protocols, Princeton, NJ, USA, 2009.Google Scholar
  14. 14.
    M. Jamshidi, A. A. Shaltooki, Z. D. Zadeh and A. M. Darwesh, A dynamic ID assignment mechanism to defend against node replication attack in static wireless sensor networks, JOIV International Journal on Informatics Visualization, Vol. 3, No. 1, pp. 13–17, 2019.CrossRefGoogle Scholar
  15. 15.
    S. Smys and J. S. Raj, A self-organized structure for mobility management in wireless networks, Computers & Electrical Engineering, Vol. 48, pp. 153–163, 2015.CrossRefGoogle Scholar
  16. 16.
    Z. Pala, K. Bicakci and M. Turk, Effects of node mobility on energy balancing in wireless networks, Computers & Electrical Engineering, Vol. 41, pp. 314–324, 2015.CrossRefGoogle Scholar
  17. 17.
    C. M. Yu, C. S. Lu, S. Y. Kuo, Mobile sensor network resilient against node replication attacks. In Proceedings of the IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008.Google Scholar
  18. 18.
    J. W. Ho, M. Wright, S. Das, Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In Proceedings of the IEEE INFOCOM, 2009. pp. 1773–1781.Google Scholar
  19. 19.
    J. W. Ho, M. Wright and S. Das, Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing, IEEE Transactions on Mobile Computing, Vol. 10, No. 6, pp. 767–782, 2011.CrossRefGoogle Scholar
  20. 20.
    D. Unnikrishnan et al., Detecting mobile replica node attacks in wireless sensor networks using sequential probability ratio test. In Proceedings of the 13th International Conference on Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012.Google Scholar
  21. 21.
    X. M. Deng and Y. Xiong, A new protocol for the detection of node replication attacks in mobile wireless sensor networks, Journal of Computer Science and Technology, Vol. 26, No. 4, pp. 732–743, 2011.MathSciNetCrossRefGoogle Scholar
  22. 22.
    K. Xing and X. Cheng, From time domain to space domain: detecting replica attacks in Mobile Ad Hoc Networks. In Proceedings of the IEEE INFOCOM, 2010.Google Scholar
  23. 23.
    C. Zhou and Z. Wang, An two dimension detection to node replication attacks in mobile sensor networks. In Anti-counterfeiting, Security, and Identification (ASID), 10th IEEE International Conference, 2016, pp. 63–69.Google Scholar
  24. 24.
    T. Dimitriou, E. A. Alrashed, M. H. Karaata and A. Hamdan, Imposter detection for replication attacks in mobile sensor networks, Computer Networks, Vol. 108, pp. 210–222, 2016.CrossRefGoogle Scholar
  25. 25.
    M. Conti, R. Di Pietro and A. Spognardi, Clone wars: distributed detection of clone attacks in mobile WSNs, Journal of Computer and System Sciences, Vol. 80, No. 3, pp. 654–669, 2014.CrossRefGoogle Scholar
  26. 26.
    V. Manickavasagam and J. Padmanabhan, A mobility optimized SPRT based distributed security solution for replica node detection in mobile sensor networks, Ad Hoc Networks, Vol. 37, pp. 140–152, 2016.CrossRefGoogle Scholar
  27. 27.
    M. Jamshidi, E. Zangeneh, M. Esnaashari and M. R. Meybodi, A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks, Computers & Electrical Engineering, Vol. 64, pp. 220–232, 2017.CrossRefGoogle Scholar
  28. 28.
    M. Jamshidi, A. M. Darwesh, A. Lorenc, M. Ranjbari and M. R. Meybodi, A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks, IEIE Transactions on Smart Processing & Computing, Vol. 7, No. 6, pp. 457–466, 2018.CrossRefGoogle Scholar
  29. 29.
    B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, ACM Communication, Vol. 13, No. 7, pp. 422–426, 1970.CrossRefGoogle Scholar
  30. 30.
    M. L. Sichitiu, Mobility models for ad hoc networks, Springer, LondonIn Guide to Wireless Ad Hoc Networks, 2009. pp. 237–254.Google Scholar
  31. 31.
    E. Shi and A. Perrig, Designing secure sensor networks, IEEE Wireless Communications, Vol. 11, pp. 38–43, 2004.Google Scholar
  32. 32.
    C. Tumrongwittayapak and R. Varakulsiripunth, Detecting sinkhole attacks in wireless sensor networks, In Proceedings of the ICROS-SICE International Joint Conference, Fukuoka International Congress Center, Japan, 2009.Google Scholar
  33. 33.
    C. Piro, C. Shields, B. N. Levine, Detecting the sybil attack in Mobile Ad hoc Networks. In Proceedings of the Securecomm and Workshops, 2006. pp. 1–11.Google Scholar
  34. 34.
    G. S. Sara and D. Sridharan, Routing in mobile wireless sensor network: a survey, Telecommunication Systems, Vol. 57, No. 1, pp. 51–79, 2014.CrossRefGoogle Scholar
  35. 35.
    M. Jamshidi, H. Bazargan, A. A. Shaltooki and A. M. Darwesh, A hybrid key pre-distribution scheme for securing communications in wireless sensor networks, JOIV International Journal on Informatics Visualization, Vol. 3, No. 1, pp. 41–46, 2019.CrossRefGoogle Scholar
  36. 36.
    L. Harn and C. F. Hsu, Predistribution scheme for establishing group keys in wireless sensor networks, IEEE Sensors Journal, Vol. 15, No. 9, pp. 5103–5108, 2015.CrossRefGoogle Scholar
  37. 37.
    A. Sobeih, J. C. Hou, L. C. Kung, et al., J-Sim: a simulation and emulation environment for wireless sensor networks, IEEE Wireless Communications, Vol. 13, No. 4, pp. 104–119, 2006.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyUniversity of Human DevelopmentSulaymaniyahIraq
  2. 2.Faculty of Computer EngineeringK. N. Toosi University of TechnologyTehranIran
  3. 3.Computer Engineering and Information Technology DepartmentAmirkabir University of TechnologyTehranIran

Personalised recommendations