Skip to main content
Log in

Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Node replication attack is one of the well-known and dangerous attacks against Wireless Sensor Networks (WSNs) in which adversary enters the network, searches randomly and captures one or multiple normal nodes. Adversary extracts data and keying materials of the captured node and generates several copies of that node and deploys them in the network. In this paper, a novel algorithm using watchdog nodes is proposed to detect replica nodes in mobile WSNs. The main idea of the proposed algorithm is inspired by maximum predefined speed for sensor nodes and using time-location tags by the watchdog nodes to detect replica nodes. Watchdog nodes collaborate to measure sensor nodes’ speed in the environment and if they find that a node moves faster than a predefined threshold, they mark it as a malicious node, because such replica node in different regions of the network is moving faster than usual in different regions of the network. The proposed algorithm is implemented by J-SIM simulator and its performance is evaluated in terms of false detection and true detection rates through some experiments. Experiment results show that the proposed algorithm is able to detect 100% of replica nodes, while the false detection rate is less than 0.5%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it, Wireless Personal Communications, Vol. 105, No. 1, pp. 145–173, 2019.

    Article  Google Scholar 

  2. M. R. Alagheband and M. R. Aref, Dynamic and secure key management model for hierarchical heterogeneous sensor networks, IET Information Security, Vol. 6, No. 4, pp. 271–280, 2012.

    Article  Google Scholar 

  3. M. Jamshidi, M. Ranjbari, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A new algorithm to defend against sybil attack in static wireless sensor networks using mobile observer sensor nodes, Adhoc & Sensor Wireless Networks, Vol. 43, pp. 213–238, 2019.

    Google Scholar 

  4. C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad hoc Networks, Vol. 1, pp. 299–302, 2003.

    Article  Google Scholar 

  5. B. Parno, A. Perrig, V. D. Gligor, Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 2005.

  6. M. Conti, R. D. Pietro, L. V. Mancini, A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the ACM MobiHoc, 2007.

  7. M. Conti, R. D. Pietro, L. V. Mancini, A. Mei, Distributed detection of clone attacks in wireless sensor networks. In Proceedings of the IEEE Transactions on Depedable and Secure Computing, 2010.

  8. H. Choi, S. Zhu, T. F. Porta, SET. detecting node clones in sensor networks. In Proceedings of the SecureComm, 2007. pp. 341–350.

  9. B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2007.

  10. C. Kim, C. Park, J. Hur, H. Lee and H. Yoon, A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks, Communications in Computer and Information Science, Vol. 56, pp. 405–412, 2009.

    Article  Google Scholar 

  11. Y. Zeng, J. Cao, S. Zhang, S. Guo and L. Xie, Random-walk based approach to detect clone attacks in wireless sensor networks, IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, pp. 677–691, 2010.

    Article  Google Scholar 

  12. C. M. Yu, C. S. Lu, S. Y. Kuo, CSI: compressed sensing-based clone identification in sensor networks. In Proceedings of the 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, 2012.

  13. M. Zhang et al., Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of the 17th annual IEEE International Conference on Network Protocols, Princeton, NJ, USA, 2009.

  14. M. Jamshidi, A. A. Shaltooki, Z. D. Zadeh and A. M. Darwesh, A dynamic ID assignment mechanism to defend against node replication attack in static wireless sensor networks, JOIV International Journal on Informatics Visualization, Vol. 3, No. 1, pp. 13–17, 2019.

    Article  Google Scholar 

  15. S. Smys and J. S. Raj, A self-organized structure for mobility management in wireless networks, Computers & Electrical Engineering, Vol. 48, pp. 153–163, 2015.

    Article  Google Scholar 

  16. Z. Pala, K. Bicakci and M. Turk, Effects of node mobility on energy balancing in wireless networks, Computers & Electrical Engineering, Vol. 41, pp. 314–324, 2015.

    Article  Google Scholar 

  17. C. M. Yu, C. S. Lu, S. Y. Kuo, Mobile sensor network resilient against node replication attacks. In Proceedings of the IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008.

  18. J. W. Ho, M. Wright, S. Das, Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In Proceedings of the IEEE INFOCOM, 2009. pp. 1773–1781.

  19. J. W. Ho, M. Wright and S. Das, Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing, IEEE Transactions on Mobile Computing, Vol. 10, No. 6, pp. 767–782, 2011.

    Article  Google Scholar 

  20. D. Unnikrishnan et al., Detecting mobile replica node attacks in wireless sensor networks using sequential probability ratio test. In Proceedings of the 13th International Conference on Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012.

  21. X. M. Deng and Y. Xiong, A new protocol for the detection of node replication attacks in mobile wireless sensor networks, Journal of Computer Science and Technology, Vol. 26, No. 4, pp. 732–743, 2011.

    Article  MathSciNet  Google Scholar 

  22. K. Xing and X. Cheng, From time domain to space domain: detecting replica attacks in Mobile Ad Hoc Networks. In Proceedings of the IEEE INFOCOM, 2010.

  23. C. Zhou and Z. Wang, An two dimension detection to node replication attacks in mobile sensor networks. In Anti-counterfeiting, Security, and Identification (ASID), 10th IEEE International Conference, 2016, pp. 63–69.

  24. T. Dimitriou, E. A. Alrashed, M. H. Karaata and A. Hamdan, Imposter detection for replication attacks in mobile sensor networks, Computer Networks, Vol. 108, pp. 210–222, 2016.

    Article  Google Scholar 

  25. M. Conti, R. Di Pietro and A. Spognardi, Clone wars: distributed detection of clone attacks in mobile WSNs, Journal of Computer and System Sciences, Vol. 80, No. 3, pp. 654–669, 2014.

    Article  Google Scholar 

  26. V. Manickavasagam and J. Padmanabhan, A mobility optimized SPRT based distributed security solution for replica node detection in mobile sensor networks, Ad Hoc Networks, Vol. 37, pp. 140–152, 2016.

    Article  Google Scholar 

  27. M. Jamshidi, E. Zangeneh, M. Esnaashari and M. R. Meybodi, A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks, Computers & Electrical Engineering, Vol. 64, pp. 220–232, 2017.

    Article  Google Scholar 

  28. M. Jamshidi, A. M. Darwesh, A. Lorenc, M. Ranjbari and M. R. Meybodi, A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks, IEIE Transactions on Smart Processing & Computing, Vol. 7, No. 6, pp. 457–466, 2018.

    Article  Google Scholar 

  29. B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, ACM Communication, Vol. 13, No. 7, pp. 422–426, 1970.

    Article  Google Scholar 

  30. M. L. Sichitiu, Mobility models for ad hoc networks, Springer, LondonIn Guide to Wireless Ad Hoc Networks, 2009. pp. 237–254.

    Google Scholar 

  31. E. Shi and A. Perrig, Designing secure sensor networks, IEEE Wireless Communications, Vol. 11, pp. 38–43, 2004.

    Google Scholar 

  32. C. Tumrongwittayapak and R. Varakulsiripunth, Detecting sinkhole attacks in wireless sensor networks, In Proceedings of the ICROS-SICE International Joint Conference, Fukuoka International Congress Center, Japan, 2009.

  33. C. Piro, C. Shields, B. N. Levine, Detecting the sybil attack in Mobile Ad hoc Networks. In Proceedings of the Securecomm and Workshops, 2006. pp. 1–11.

  34. G. S. Sara and D. Sridharan, Routing in mobile wireless sensor network: a survey, Telecommunication Systems, Vol. 57, No. 1, pp. 51–79, 2014.

    Article  Google Scholar 

  35. M. Jamshidi, H. Bazargan, A. A. Shaltooki and A. M. Darwesh, A hybrid key pre-distribution scheme for securing communications in wireless sensor networks, JOIV International Journal on Informatics Visualization, Vol. 3, No. 1, pp. 41–46, 2019.

    Article  Google Scholar 

  36. L. Harn and C. F. Hsu, Predistribution scheme for establishing group keys in wireless sensor networks, IEEE Sensors Journal, Vol. 15, No. 9, pp. 5103–5108, 2015.

    Article  Google Scholar 

  37. A. Sobeih, J. C. Hou, L. C. Kung, et al., J-Sim: a simulation and emulation environment for wireless sensor networks, IEEE Wireless Communications, Vol. 13, No. 4, pp. 104–119, 2006.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mojtaba Jamshidi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamshidi, M., Esnaashari, M., Darwesh, A.M. et al. Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks. Int J Wireless Inf Networks 27, 102–115 (2020). https://doi.org/10.1007/s10776-019-00469-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-019-00469-0

Keywords

Navigation