Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation

被引:1
作者
Ho, Jun-Won [1 ]
机构
[1] Seoul Womens Univ, Dept Informat Secur, Seoul 139774, South Korea
关键词
MODELS;
D O I
10.1155/2013/839523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node's behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner.
引用
收藏
页数:7
相关论文
共 14 条
[1]  
[Anonymous], P 2 ACM WORKSH SEC A
[2]  
Ho J. W., 2012, P ADV SIGN PROC ASP
[3]   Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN [J].
Jin, Xinyu ;
Putthapipat, Pasd ;
Pan, Deng ;
Pissinou, Niki ;
Makki, S. Kami .
2010 IEEE GLOBECOM WORKSHOPS, 2010, :2059-2064
[4]  
Le Boudec JY, 2005, IEEE INFOCOM SER, P2743
[5]   Mobility reduces uncertainty in MANETs [J].
Li, Feng ;
Wu, Jie .
INFOCOM 2007, VOLS 1-5, 2007, :1946-+
[6]   Perfect simulations for random trip mobility models [J].
PalChaudhuri, S ;
Le Boudec, JY ;
Vojnovic, M .
38TH ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2005, :72-79
[7]   Soft tamper-proofing via program integrity verification in wireless sensor networks [J].
Park, T ;
Shin, KG .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (03) :297-309
[8]  
Seshadri A, 2004, P IEEE S SECUR PRIV, P272
[9]  
Shaneck M, 2005, LECT NOTES COMPUT SC, V3813, P27
[10]  
Sun Y. L., 2006, P 25 IEEE INT C COMP, P1