Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2005.8guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Distributed Detection of Node Replication Attacks in Sensor Networks

Published: 08 May 2005 Publication History
  • Get Citation Alerts
  • Abstract

    The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Previous node replication detection schemes depend primarily on centralized mechanisms with single points of failure, or on neighborhood voting protocols that fail to detect distributed replications. To address these fundamental limitations, we propose two new algorithms based on emergent properties, i.e., properties that arise only through the collective action of multiple nodes. Randomized Multicast distributes node location information to randomly-selected witnesses, exploiting the birthday paradox to detect replicated nodes, while Line-Selected Multicast uses the topology of the network to detect replication. Both algorithms provide globally-aware, distributed node-replica detection, and Line-Selected Multicast displays particularly strong performance characteristics. We show that emergent algorithms represent a promising new approach to sensor network security; moreover, our results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary.

    Cited By

    View all
    • (2021)Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacksComputer Science Review10.1016/j.cosrev.2021.10037140:COnline publication date: 1-May-2021
    • (2020)Two-stage data encryption using chaotic neural networksJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-17954338:3(2561-2568)Online publication date: 1-Jan-2020
    • (2020)Size efficient preprocessed symmetric rsa for wireless body area networkACM SIGAPP Applied Computing Review10.1145/3392350.339235220:1(15-23)Online publication date: 5-Apr-2020
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
    May 2005
    244 pages
    ISBN:0769523390

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 08 May 2005

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 29 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacksComputer Science Review10.1016/j.cosrev.2021.10037140:COnline publication date: 1-May-2021
    • (2020)Two-stage data encryption using chaotic neural networksJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-17954338:3(2561-2568)Online publication date: 1-Jan-2020
    • (2020)Size efficient preprocessed symmetric rsa for wireless body area networkACM SIGAPP Applied Computing Review10.1145/3392350.339235220:1(15-23)Online publication date: 5-Apr-2020
    • (2018)Node authentication algorithm for securing static wireless sensor networks from node clone attackInternational Journal of Information and Computer Security10.5555/3270804.327080610:2-3(129-148)Online publication date: 1-Jan-2018
    • (2018)An efficient dynamic access control scheme for distributed wireless sensor networksInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2018.08835027:1(1-18)Online publication date: 1-Jan-2018
    • (2018)Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNsProceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence10.1145/3297156.3297226(468-473)Online publication date: 8-Dec-2018
    • (2018)A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of ThingsProceedings of the 2nd International Symposium on Computer Science and Intelligent Control10.1145/3284557.3284699(1-6)Online publication date: 21-Sep-2018
    • (2018)Security for 4G and 5G cellular networksJournal of Network and Computer Applications10.1016/j.jnca.2017.10.017101:C(55-82)Online publication date: 1-Jan-2018
    • (2018)Distributed Location and Trust Based Replica Detection in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5369-2102:4(3303-3321)Online publication date: 1-Oct-2018
    • (2018)Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient OperationsWireless Personal Communications: An International Journal10.1007/s11277-017-5157-499:2(893-914)Online publication date: 1-Mar-2018
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media