Skip to main content

A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6081))

Abstract

Wireless sensor networks are often deployed in hostile environments and sensor nodes are lack hardware support for resistance; thus, leaving them vulnerable to several kinds of threats and attacks. While most of threats and attacks can be prevented by using cryptographic approaches provided by key management, such as eavesdropping, intrusion and node compromising. Unfortunately node replication attacks can still go undetectable. In node replication attacks, an attacker compromising a node, uses its secret cryptographic key materials to populate the network with several clones of it. Several node replication detect protocols were proposed. However, centralized protocols have a single point of failure, local protocols fail to detect distributed replications, and distributed protocols need nodes know their exact geographic locations. This paper proposes a note-based protocol for detecting node replication attacks, which introduces no significant overhead on the resource-constrained sensors. The proposed protocol needn’t the geographic locations of nodes as well. Moreover, further analysis shows that it achieves a much higher probability of detecting replications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dyer, J., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.W., Weingart, S.: Building the IBM 4758 Secure Coprocessor. IEEE Computer (2001)

    Google Scholar 

  2. Smith, S.W., Weingart, S.: Building a high performance, programmable secure coprocessor. Computer Networks, Special Issue on Computer Network Security (April 1999)

    Google Scholar 

  3. Weingart, S.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 88–95. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of The 2005 IEEE Symposim on Security and Privacy, pp. 49–63 (2005)

    Google Scholar 

  5. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In: MobiHoc 2007, September 9-14 (2007)

    Google Scholar 

  6. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 41–47 (2002)

    Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  8. Douceur, J.R.: The sybil attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS 2001), pp. 251–260. Springer, Heidelberg (2002)

    Google Scholar 

  9. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & de-fenses. In: Proceedings of ACM IPSN 2004, pp. 259–268 (2004)

    Google Scholar 

  10. Caruso, A., Urpi, A., Chessa, S., De, S.: Gps-free coordinate assignment and routing in wireless sensor networks. In: Proceedings of IEEE INFOCOM 2005, pp. 150–160 (2005)

    Google Scholar 

  11. Elson, J., Girod, L., Estrin, D.: Fine-grained network time synchronization using reference broadcasts. SIGOPS Operating Systems Review 36(SI), 147–163 (2002)

    Article  Google Scholar 

  12. Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: ACM OBICOM, pp. 255–265 (2000)

    Google Scholar 

  14. Wang, G., Zhang, W., Cao, G., Porta, T.: On supporting distributed collaboration in sensor networks. In: IEEE MILCOM (2003)

    Google Scholar 

  15. Deb, B., Bhatnagar, S., Nath, B.: Reinform: Reliable information forwarding using multiple paths in sensor networks. In: 28th IEEE LCN, p. 406 (2003)

    Google Scholar 

  16. Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: IEEE ACSAC, pp. 257–267 (2007)

    Google Scholar 

  17. Sei, Y., Honiden, S.: Reporter node determination of replicated node detection in wireless sensor networks. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (2009)

    Google Scholar 

  18. Elson, J., Estrin, D.: Time synchronization for wireless sensor networks. In: Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS 2001), pp. 1965–1970 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Meng, X., Lin, K., Li, K. (2010). A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks. In: Hsu, CH., Yang, L.T., Park, J.H., Yeo, SS. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2010. Lecture Notes in Computer Science, vol 6081. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13119-6_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13119-6_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13118-9

  • Online ISBN: 978-3-642-13119-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics