An asynchronous node replication attack in wireless sensor networks

被引:0
|
作者
Zhou, Jianying [1 ]
Das, Tanmoy Kanti
Lopez, Javier [2 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Univ Malaga, Comp Sci Dept, E-29071 Malaga, Spain
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
wireless sensor network security; node replication attack; distributed detection protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant is the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, And one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
引用
收藏
页码:125 / +
页数:3
相关论文
共 49 条
  • [1] Security Of Mobile Wireless Sensor Networks Against Node Replication Attack In Healthcare Applications
    Sindhuja, L. S.
    Beatrice, B. Anuja
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 102 - 109
  • [2] PREVENTING NODE REPLICATION ATTACK IN STATIC WIRELESS SENSOR NETWROKS
    Singh, Moirangthem Marjit
    Singh, Ankita
    Mandal, Jyotsana Kumar
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [3] The Replication Attack in Wireless Sensor Networks: Analysis and Defenses
    Manjula, V.
    Chellappan, C.
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 169 - 178
  • [4] Detection of Masked Replication Attack in Wireless Sensor Networks
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohamad Naufal Mohamad
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [5] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [6] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [7] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [8] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [9] Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 214 - 219
  • [10] Dynamic Detection of Node Replication Attacks using X-RED in Wireless Sensor Networks
    Abinaya, P.
    Geetha, C.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,