Skip to main content

Wireless Sensor Replica Detection in Mobile Environments

  • Conference paper
Distributed Computing and Networking (ICDCN 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7129))

Included in the following conference series:

Abstract

Wireless Sensor Networks (WSNs) pose a few unique security challenges due to the fact that they (often) run unattended, do not rely on tamper-resistant hardware, and are severely resource constrained—to name a few. In this context, a particularly dreadful attack is the replica attack. That is, sensors are captured and their state seized, and replicated in reprogrammed sensors eventually performing some rogue activities. While some solutions to this problem do exist in static WSNs, mobile WSNs lack of solutions that are both effective and efficient, due to the complexity added by sensor mobility.

In this paper, we propose a novel solution against the replica attack in mobile WSNs. In particular, we provide the following contributions: we first introduce a novel realistic attacker model that can be used to assess the quality of the solutions provided. Later, we detail a distributed, efficient, and cooperative protocol to detect replica. Leveraging just local (one-hop) communications and node mobility our solution enforces the emergent property of replica detection. Finally, our solution is tested against the introduced attacker model. Simulation results show that our solution is effective and efficient—providing high detection rate while incurring limited overhead.

This paper has been partially supported by: the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme European Commission - Directorate-General Home Affairs, under the ExTrABIRE project, HOME/2009/CIPS/AG/C2-065; the grant HPC-2011 from CASPUR (Italy); ACC1O, the Catalan Business Comptitiveness Support Agency; and project S-MOBILE, contract VIT.7627 funded by STW - Sentinels, The Netherlands.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. International Journal of Computer and Telecommunications Networking - Elsevier 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N., Kandemir, M.T.: On the detection of clones in sensor networks using random key predistribution. IEEE TSMC, Part C: Applications and Reviews 37(6), 1246–1258 (2007)

    Google Scholar 

  4. Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, pp. 1917–1928 (2005)

    Google Scholar 

  5. Caruso, A., Urpi, A., Chessa, S., De., S.: Gps-free coordinate assignment and routing in wireless sensor networks. In: INFOCOM 2005, pp. 150–160 (2005)

    Google Scholar 

  6. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: S&P 2003. pp. 197–213 (2003)

    Google Scholar 

  7. Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting Node Clones in Sensor Networks. In: SecureComm 2007, pp. 341–350 (2007)

    Google Scholar 

  8. Conti, M., Di Pietro, R., Mancini, L., Mei, A.: Distributed detection of clone attacks in wireless sensor networks. IEEE TDSC 8, 685–698 (2011)

    Google Scholar 

  9. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Requirements and open issues in distributed detection of node identity replicas in WSN. In: SMC 2006, pp. 1468–1473 (2006)

    Google Scholar 

  10. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007, pp. 80–89 (2007)

    Google Scholar 

  11. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Mobility and cooperation to thwart node capture attacks in manets. Journal on Wireless Communications and Networking (EURASIP) 2009(8) (2009)

    Google Scholar 

  12. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Elson, J., Estrin, D.: Time synchronization for wireless sensor networks. In: IPDPS 2001, pp. 1965–1970 (2001)

    Google Scholar 

  14. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  15. Fu, F., Liu, J., Yin, X.: Space-time related pairwise key predistribution scheme for wireless sensor networks. In: WiCom 2007, pp. 2692–2696 (2007)

    Google Scholar 

  16. Fu, L., Qin, Y., Wang, X., Liu, X.: Converge-cast with mimo. In: INFOCOM 2011. IEEE (to appear, 2011)

    Google Scholar 

  17. Ho, J.W., Wright, M.K., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: INFOCOM 2009, pp. 1773–1781 (2009)

    Google Scholar 

  18. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, pp. 1976–1986 (2003)

    Google Scholar 

  19. Matsumoto, M.: Mersenne Twister, A very fast random number generator, http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/emt.html

  20. Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM TOMACS 8(1), 3–30 (1998)

    Article  MATH  Google Scholar 

  21. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004, pp. 259–268 (2004)

    Google Scholar 

  22. Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In: S&P 2005, pp. 49–63 (2005)

    Google Scholar 

  23. Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27, 228–234 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  24. Spognardi, A.: Mobile Clone detection simulator, http://tinyurl.com/mobilewsn-clone-detection-tar

  25. Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE TDSC 2(3), 177–189 (2005)

    Google Scholar 

  26. Wang, Y., Chu, X., Wang, X., Cheng, Y.: Optimal multicast capacity and delay tradeoffs in manets: a global perspective. In: INFOCOM 2011. IEEE (to appear, 2011)

    Google Scholar 

  27. Xing, K., Cheng, X.: From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In: INFOCOM 2010, pp. 1595–1603 (2010)

    Google Scholar 

  28. Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006, pp. 356–367 (2006)

    Google Scholar 

  29. Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks (poster). In: SECON 2008, pp. 597–599 (2008)

    Google Scholar 

  30. Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: ACSAC 2007. pp. 257–266 (2007)

    Google Scholar 

  31. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003, pp. 62–72 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Conti, M., Di Pietro, R., Spognardi, A. (2012). Wireless Sensor Replica Detection in Mobile Environments. In: Bononi, L., Datta, A.K., Devismes, S., Misra, A. (eds) Distributed Computing and Networking. ICDCN 2012. Lecture Notes in Computer Science, vol 7129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25959-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25959-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25958-6

  • Online ISBN: 978-3-642-25959-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics