An Asynchronous Node Replication Attack in Wireless Sensor Networks

  • Jianying Zhou
  • Tanmoy Kanti Das
  • Javier Lopez
Part of the IFIP – The International Federation for Information Processing book series (IFIPAICT, volume 278)


Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant as the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, and one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.


Wireless Sensor Network Security Node Replication Attack Distributed Detection Protocol 


  1. 1.
    I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. “A Survey on Sensor Networks”. IEEE Communications Magazine, 40(8):102-114, 2002.CrossRefGoogle Scholar
  2. 2.
    J. Baek, E. Foo, H. C. Tan, and J. Zhou. “SecuringWireless Sensor Networks - Threats and Countermeasures”. Book Chapter in Security and Privacy in Wireless and Mobile Computing, Troubador Publishing, 2008.Google Scholar
  3. 3.
    M. Cagalj, S. Capkun, and J. P. Hubaux. “Wormhole-Based Antijamming Techniques in Sensor Networks”. IEEE Transactions on Mobile Computing, 6(1):100-114, 2007.CrossRefGoogle Scholar
  4. 4.
    H. Chan, A. Perrig, and D. Song. “Secure Hierarchical In-Network Aggregation in Sensor Networks”. 2006 ACM Conference on Computer and Communications Security (CCS’06), pp. 278-287, 2006.Google Scholar
  5. 5.
    T. Cormen, C. Leiserson, R. Rivest, and C. Stein. “Introduction to Algorithms”. MIT Press, 2001.Google Scholar
  6. 6.
    D. Denning. “An Intrusion Detection Model”. IEEE Transactions on Software, Vol. SE-13, No. 2, pp. 222-232, 1987.Google Scholar
  7. 7.
    C. Hartung, J. Balasalle, and R. Han. “Node Compromise in Sensor Networks: The Need for Secure System”. Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder, 2004.Google Scholar
  8. 8.
    Y. C. Hu, A. Perrig, and D. B. Johnson. “Packet Leashes: A Defense againstWormhole Attacks in Wireless Networks”. 2003 IEEE INFOCOMM.Google Scholar
  9. 9.
    J. Lopez and J. Zhou (editors). “Wireless Sensor Network Security”. Cryptology & Information Security Series, Vol. 1, IOS Press, 2008.Google Scholar
  10. 10.
    J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter. “Detection of Denial-of-Message Attacks on Sensor Network Broadcasts”. 2005 IEEE Symposium on Security and Privacy (S&P’05), pp. 64-78, May 2005.Google Scholar
  11. 11.
    C. Karlof and D. Wagner. “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure”. AdHoc Networks, Vol. 1, Issues 2-3, pp. 293-315, Elsevier, September 2003.Google Scholar
  12. 12.
    B. Karp and H. T. Kung. “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”. 2000 ACM Annual International Conference on Mobile Computing and Networking (MobiCom’00), pp. 243-254, 2000.Google Scholar
  13. 13.
    J. Newsome, E. Shi, D. Song, and A. Perrig. “The Sybil Attack in Sensor Networks: Analysis & Defenses”. 2004 ACM International Symposium on Information Processing in Sensor Networks (IPSN’04), pp. 259-268, April 2004.Google Scholar
  14. 14.
    B. Parno, A. Perrig, and V. Gligor. “Distributed Detection of Node Replication Attacks in Sensor Networks”. 2005 IEEE Symposium on Security and Privacy (S&P’05), pp. 49-63, May 2005.Google Scholar
  15. 15.
    A. Perrig, J. Stankovic, and D. Wagner. “Security in Wireless Sensor Networks”. Communications of the ACM, 47(6):53-57, Special Issue on Wireless Sensor Networks, 2004.CrossRefGoogle Scholar
  16. 16.
    A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. “SPINS: Security Protocols for Sensor Networks”. Wireless Networks, Vol. 8, pp. 521-534, 2002.CrossRefGoogle Scholar
  17. 17.
    S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenkar. “GHT: A Geographic Hash Table for Data-Centric Storage”. 2002 ACM International Workshop on Wireless Sensor Networks and Applications (WSNA’02), September 2002.Google Scholar
  18. 18.
    D. Wood and J. A. Stankovic. “Denial of Service in Sensor Networks”. IEEE Computer, Vol.35, No. 10, 2002.Google Scholar
  19. 19.
    F. Ye, H. Luo, S. Lu, and L. Zhang. “Statistical En-route Filtering of Injected False Data in Sensor Networks”. IEEE Journal on Selected Areas in Communications, 23(4):839-850, April 2005.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Jianying Zhou
    • 1
  • Tanmoy Kanti Das
  • Javier Lopez
    • 2
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Computer Science DepartmentUniversity of MalagaSpain

Personalised recommendations