Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks

Published: 01 March 2013 Publication History

Abstract

Wireless sensor networks (WSN) are susceptible to various kinds of attack, and node replication attack is one of them. It is considered to be one of the most serious attacks in WSN. In this type of attack, an adversary deploys clones of a legitimate node. These clones participate in all network activities and behave identically same as the legitimate node. Therefore, detection of clones in the network is a challenging task. Most of the work reported in the literature for clone detection is location dependent. In this paper, we have proposed a location independent zone-based node replica detection technique. In the proposed scheme, the network is dynamically divided into a number of zones. Each zone has a zone-leader, and they share their membership list among themselves. It is the responsibility of the zone-leader to detect the clone. The proposed technique is a deterministic one. We have compared our scheme with LSM, RED, and P-MPC and observed that it has a higher clone detection probability and a lower communication cost.

References

[1]
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communication, 40(8), 102-114.
[2]
Boulis, A. (2009). Castalia: A simulator for wireless sensor networks and body area networks. Australia: National ICT Australia Ltd.
[3]
Choi, H., Zhu, S., & Porta, T. F. L. (2007). Set: Detecting node clones in sensor networks. In Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007, IEEE, Nice, France, pp. 341-350.
[4]
Chong, C. Y., & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8), 1247-1256.
[5]
Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA international conference on cryptography and coding (pp. 360-363). London, UK: Springer.
[6]
Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2006). Requirements and open issues in distributed detection of node identity replicas in wsn. In IEEE international conference on systems, man and cybernetics, SMC '06 (pp. 1468-1473). Taipei: IEEE.
[7]
Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2007). A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, MobiHoc '07 (pp. 80-89). Montreal, Canada: ACM.
[8]
Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476-1488.
[9]
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2 and 3), 293-315.
[10]
Ko, L. C., Chen, H. Y., & Lin, G. R. (2009). A neighbor-based detection scheme for wireless sensor networks against node replication attacks. In Proceedings of international conference on ultra modern telecommunications and workshops, ICUMT '09 (pp. 1-6). St. Petersburg: IEEE.
[11]
Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49-63). IEEE.
[12]
Perrig, A., Stankovic, J., & Wagner, D. (2004). Secuirty in wireless sensor networks. Communications of the ACM, 47(6), 53-57.
[13]
Sarma, H. K. D., & Kar, A. (2006). Security threats in wireless sensor networks. In Proceedings 40th of annual IEEE international carnahan conferences security technology (pp. 243-251). Lexington, KY: IEEE.
[14]
Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. In Proceedings of the 4th annual international conference on wireless internet, WICON '08 (pp. 01-08). Brussels, Belgium: ICST.
[15]
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO'84 on advances in cryptology (pp. 01-04). New York, USA: Springer.
[16]
Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habit monitoring application. In Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 214-226). Baltimore, USA: ACM.
[17]
Varga, A., & Hornig, R. (2008). An overview of the omnet++ simulation environment. In Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems and workshops, Simutools'08 (pp. 01-10). Brussels, Belgium: ICST.
[18]
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 02-23.
[19]
Zhang, M., Khanapure, V., Chen, S., & Xiao, X. (2009). Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of 17th IEEE international conference on network protocols, ICNP'09 (pp. 284-293). Princeton, NJ: IEEE.
[20]
Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., & Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of computer security applications conference, ACSAC 2007 (pp. 257-267). Miami Beach, FL: IEEE.
[21]
Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor and mobile radio communications, 09 (pp. 82-86). Tokyo: IEEE.

Cited By

View all
  1. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Wireless Personal Communications: An International Journal
    Wireless Personal Communications: An International Journal  Volume 69, Issue 2
    March 2013
    472 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 March 2013

    Author Tags

    1. Message encoding
    2. Replica detection
    3. Wireless sensor networks
    4. Zone formation

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media