Abstract
Wireless Sensor Networks (WSNs) pose a few unique security challenges due to the fact that they (often) run unattended, do not rely on tamper-resistant hardware, and are severely resource constrained—to name a few. In this context, a particularly dreadful attack is the replica attack. That is, sensors are captured and their state seized, and replicated in reprogrammed sensors eventually performing some rogue activities. While some solutions to this problem do exist in static WSNs, mobile WSNs lack of solutions that are both effective and efficient, due to the complexity added by sensor mobility.
In this paper, we propose a novel solution against the replica attack in mobile WSNs. In particular, we provide the following contributions: we first introduce a novel realistic attacker model that can be used to assess the quality of the solutions provided. Later, we detail a distributed, efficient, and cooperative protocol to detect replica. Leveraging just local (one-hop) communications and node mobility our solution enforces the emergent property of replica detection. Finally, our solution is tested against the introduced attacker model. Simulation results show that our solution is effective and efficient—providing high detection rate while incurring limited overhead.
This paper has been partially supported by: the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme European Commission - Directorate-General Home Affairs, under the ExTrABIRE project, HOME/2009/CIPS/AG/C2-065; the grant HPC-2011 from CASPUR (Italy); ACC1O, the Catalan Business Comptitiveness Support Agency; and project S-MOBILE, contract VIT.7627 funded by STW - Sentinels, The Netherlands.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. International Journal of Computer and Telecommunications Networking - Elsevier 38(4), 393–422 (2002)
Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006)
Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N., Kandemir, M.T.: On the detection of clones in sensor networks using random key predistribution. IEEE TSMC, Part C: Applications and Reviews 37(6), 1246–1258 (2007)
Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, pp. 1917–1928 (2005)
Caruso, A., Urpi, A., Chessa, S., De., S.: Gps-free coordinate assignment and routing in wireless sensor networks. In: INFOCOM 2005, pp. 150–160 (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: S&P 2003. pp. 197–213 (2003)
Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting Node Clones in Sensor Networks. In: SecureComm 2007, pp. 341–350 (2007)
Conti, M., Di Pietro, R., Mancini, L., Mei, A.: Distributed detection of clone attacks in wireless sensor networks. IEEE TDSC 8, 685–698 (2011)
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Requirements and open issues in distributed detection of node identity replicas in WSN. In: SMC 2006, pp. 1468–1473 (2006)
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007, pp. 80–89 (2007)
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Mobility and cooperation to thwart node capture attacks in manets. Journal on Wireless Communications and Networking (EURASIP) 2009(8) (2009)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Elson, J., Estrin, D.: Time synchronization for wireless sensor networks. In: IPDPS 2001, pp. 1965–1970 (2001)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002, pp. 41–47 (2002)
Fu, F., Liu, J., Yin, X.: Space-time related pairwise key predistribution scheme for wireless sensor networks. In: WiCom 2007, pp. 2692–2696 (2007)
Fu, L., Qin, Y., Wang, X., Liu, X.: Converge-cast with mimo. In: INFOCOM 2011. IEEE (to appear, 2011)
Ho, J.W., Wright, M.K., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: INFOCOM 2009, pp. 1773–1781 (2009)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, pp. 1976–1986 (2003)
Matsumoto, M.: Mersenne Twister, A very fast random number generator, http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/emt.html
Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM TOMACS 8(1), 3–30 (1998)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004, pp. 259–268 (2004)
Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In: S&P 2005, pp. 49–63 (2005)
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27, 228–234 (1980)
Spognardi, A.: Mobile Clone detection simulator, http://tinyurl.com/mobilewsn-clone-detection-tar
Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE TDSC 2(3), 177–189 (2005)
Wang, Y., Chu, X., Wang, X., Cheng, Y.: Optimal multicast capacity and delay tradeoffs in manets: a global perspective. In: INFOCOM 2011. IEEE (to appear, 2011)
Xing, K., Cheng, X.: From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In: INFOCOM 2010, pp. 1595–1603 (2010)
Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006, pp. 356–367 (2006)
Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks (poster). In: SECON 2008, pp. 597–599 (2008)
Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: ACSAC 2007. pp. 257–266 (2007)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003, pp. 62–72 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Conti, M., Di Pietro, R., Spognardi, A. (2012). Wireless Sensor Replica Detection in Mobile Environments. In: Bononi, L., Datta, A.K., Devismes, S., Misra, A. (eds) Distributed Computing and Networking. ICDCN 2012. Lecture Notes in Computer Science, vol 7129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25959-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-25959-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25958-6
Online ISBN: 978-3-642-25959-3
eBook Packages: Computer ScienceComputer Science (R0)