Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Detecting node replication attacks in mobile sensor networks: theory and approaches

Published: 01 May 2012 Publication History

Abstract

A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With the revealed secret credentials, the adversary can create many duplicate nodes that are seemingly legitimate, and deploy them into the network to cripple the monitoring applications. Defending against node replication attacks has become an important research topic in sensor network security, but so far, not many solutions have been proposed, most of which adopt a stationary network model where sensor nodes are fixed and immobile. In this work, we address the problem of detecting node replication attacks in a mobile sensor network, where each sensor node freely and randomly roams in the sensing region all the time, and one node meets with another in an occasional and unpredictable manner. For replication attacks where the replicas do not conspire, we employ very lightweight token-based authentication as a detection approach. In case the replicas conspire by communicating with each other in an efficient manner, we harness the random encounters between physical nodes and propose a detection method based on statistics. Compared with existent solutions, our detections have the nice feature that sensor nodes are freed from the fragile assumption that they can correctly obtain their geographic positions, and that even loose time synchronization may be unnecessary. Copyright © 2011 John Wiley & Sons, Ltd.

Cited By

View all
  • (2021)An Efficient Three-Phase Fuzzy Logic Clone Node Detection ModelSecurity and Communication Networks10.1155/2021/99244782021Online publication date: 1-Jan-2021
  • (2016)Imposter detection for replication attacks in mobile sensor networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.5555/3006048.3006136108:C(210-222)Online publication date: 24-Oct-2016
  • (2015)Effective Key Management in Dynamic Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2014.237555510:2(371-383)Online publication date: 13-Jan-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 5, Issue 5
May 2012
117 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 May 2012

Author Tags

  1. detection
  2. mobile sensor network
  3. node replication attack
  4. patrol robot system
  5. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)An Efficient Three-Phase Fuzzy Logic Clone Node Detection ModelSecurity and Communication Networks10.1155/2021/99244782021Online publication date: 1-Jan-2021
  • (2016)Imposter detection for replication attacks in mobile sensor networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.5555/3006048.3006136108:C(210-222)Online publication date: 24-Oct-2016
  • (2015)Effective Key Management in Dynamic Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2014.237555510:2(371-383)Online publication date: 13-Jan-2015
  • (2014)The history-based authentication patternProceedings of the 19th European Conference on Pattern Languages of Programs10.1145/2721956.2721960(1-9)Online publication date: 9-Jul-2014
  • (2013)Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networksInternational Journal of Grid and Utility Computing10.1504/IJGUC.2013.0562474:2/3(119-127)Online publication date: 1-Sep-2013
  • (2012)ReviewJournal of Network and Computer Applications10.1016/j.jnca.2012.01.00235:3(1022-1034)Online publication date: 1-May-2012

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media