Skip to main content

Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 747))

Abstract

In unattended wireless sensor networks (UWSNs), static sensor nodes monitor environment, store sensing data in memory temporally. Mobile sink patrols and collects the sensors’ data itinerantly. Mobile sink is granted with more permissions than static sensor nodes, rendering it more attractive to the adversary. By compromising the mobile sinks, the adversary can not only seek the sensing data, but it also can steel all kinds of keys and access permissions, which may be abused to undermine other benign sensor nodes, even worse to upset the whole network. Currently, many related works focus on key management, permission management to restrict the compromised mobile sink or authentication to guarantee data reliability. However, the issue of compromised mobile sinks attracts little attention, and gradually become one obstacle to the application of UWSNs.

In this paper, we proposed a secret-sharing method for detecting compromised mobile sink in UWSNs. Before the sensing data are collected by the mobile sink, every sensor node splits the digest of its data into shares by using a polynomial secret sharing algorithm, and dispatches these secret shares to randomly chosen neighbor nodes, which thereafter send to the base-station through different routes. After enough shares are gathered, the base-station recovers the original data digest, which will be used to validate the sensing data submitted by the mobile sink. If the validation fails, it reveals a compromised mobile sink. Theoretical analysis and evaluation indicate the effectiveness and efficiency of our method. Also, we proposed two types of attacking model of the mobile adversary, and obtained the respective detection probability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Khan, A.W., Abdullah, A.H., Anisi, M.H., Bangash, J.I.: A comprehensive study of data collection schemes using mobile sinks in wireless sensor networks. Sensors 2014(14), 2510–2548 (2014)

    Article  Google Scholar 

  2. Di Pietro, R., et al.: Data security in unattended wireless sensor networks. IEEE Trans. Comput. 58(11), 1500–1511 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  3. Reddy, S.K.V.L., Ruj, S., Nayak, A.: Distributed data survivability schemes in mobile unattended wireless sensor networks. In: Global Communications Conference (GLOBECOM 2012), Anaheim, California, USA, pp. 979–984. IEEE Press (2012)

    Google Scholar 

  4. Chen, C., Gao, X.B., Pei, Q.Q., et al.: A tactics to alleviate influence of denial-of-sleep attack in WSN. J. Jiangsu Univ. Nat. Sci. Ed. 31(5), 570–575 (2010)

    Google Scholar 

  5. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24

    Chapter  Google Scholar 

  6. Culpepper, B.J., Tseng, H.C.: Sinkhole intrusion indicators in DSR MANETs. In: Proceedings of 1st International Conference on Broadband Networks (Broad-Nets 2004), San Jose, California, USA, pp. 681–688. IEEE Press (2004)

    Google Scholar 

  7. Khan, W.Z., Aalsalem, M.Y., Saad, N.M.: Distributed clone detection in static wireless sensor networks: random walk with network division. PLoS One 10(5), e0123069 (2015)

    Article  Google Scholar 

  8. Mishra, A.K., Turuk, A.K.: Node coloring based replica detection technique in wireless sensor networks. Wirel. Netw. 20(8), 2419–2435 (2014)

    Article  Google Scholar 

  9. Contia, M., Pietro, R., Di Spognardic, A.: Clone wars: distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci. 80(3), 654–669 (2014)

    Article  MATH  Google Scholar 

  10. Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks. In: Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), San Francisco, USA, pp. 597–599. IEEE Press (2008)

    Google Scholar 

  11. Xing, K., Cheng, X.: From time domain to space domain: detecting replica attacks in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA, pp. 1–9. IEEE Press (2010)

    Google Scholar 

  12. Wang, L.M., Shi, Y.: Patrol detection for replica attacks on wireless sensor networks. Sensors 2011(11), 2496–2504 (2011)

    Article  Google Scholar 

  13. Song, H., Zhu, S., Zhang, W., et al.: Least privilege and privilege deprivation: toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN), 4(4) (2008). Article 23

    Google Scholar 

  14. Liu, Z., Ma, J., Park, Y., et al.: Data security in unattended wireless sensor networks with mobile sinks. Wirel. Commun. Mob. Comput. 12(13), 1131–1146 (2012)

    Article  Google Scholar 

  15. Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mob. Comput. 4(3), 297–309 (2005)

    Article  Google Scholar 

  16. Du, X.: Detection of compromised sensor nodes in heterogeneous sensor networks. In: Proceedings of the IEEE 2008 International Conference on Communications (ICC 2008), Beijing, China, pp. 1446–1450. IEEE Press (2008)

    Google Scholar 

  17. Yang, Y., Wang, X., Zhu, S., et al.: Distributed software-based attestation for node compromise detection in sensor networks. In: Proceedings of 26th IEEE International Symposium on Reliable Distributed Systems, Beijing, China, pp. 219–230. IEEE Press (2007)

    Google Scholar 

  18. Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73275-4_15

    Chapter  Google Scholar 

  19. Jin, X., Putthapipat, P., Pan, D., et al.: Unpredictable software-based attestation solution for node compromise detection in mobile WSN. In: Proceedings of the IEEE 2010 GLOBECOM Workshops (GC Wkshps), Miami, Florida, USA, pp. 2059–2064. IEEE Press (2010)

    Google Scholar 

  20. Sei, Y., Ohsuga, A.: Need only one bit: light-weight packet marking for detecting compromised nodes in WSNs. In: Proceedings of the 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), Barcelona, Spain, pp. 134–143. IARIA (2013)

    Google Scholar 

  21. Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006). https://doi.org/10.1007/11734666_9

    Chapter  Google Scholar 

  22. Conti, M., Di Pietro, R., Mancini, L.V., et al.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, pp. 214–219. ACM (2008)

    Google Scholar 

  23. Conti, M., Di Pietro, R., Mancini, L.V., et al.: Mobility and cooperation to thwart node capture attacks in manets. EURASIP J. Wirel. Commun. Network. 2009(1), 945943 (2009)

    Article  Google Scholar 

  24. Ding, W., Yu, Y., Yenduri, S.: Distributed first stage detection for node capture. In: Proceedings of 2010 IEEE GLOBECOM Workshops (GC Wkshps), Miami, USA, pp. 1566–1570. IEEE Press (2010)

    Google Scholar 

  25. Dimitriou, T., Sabouri, A.: Pollination: a data authentication scheme for unattended wireless sensor networks. In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha, China, pp. 409–416. IEEE Press (2011)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China under Grant No. 61272074 and No. U1405255, the Key Research & Development Project of Jiangsu Province under Grant No. BE2015136, and the Industrial Science and Technology Foundation of Zhenjiang City under Grant No. GY2013030.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyi Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, X., Wang, L. (2018). Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8890-2_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8889-6

  • Online ISBN: 978-981-10-8890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics