An asynchronous node replication attack in wireless sensor networks

被引:0
|
作者
Zhou, Jianying [1 ]
Das, Tanmoy Kanti
Lopez, Javier [2 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Univ Malaga, Comp Sci Dept, E-29071 Malaga, Spain
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
wireless sensor network security; node replication attack; distributed detection protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant is the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, And one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
引用
收藏
页码:125 / +
页数:3
相关论文
共 49 条
  • [11] Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
    Khan, Wazir Zada
    Saad, Mohamad Naufal bin Mohamad
    Aalsalem, Mohammed Y.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 119 - 127
  • [12] Detection and Mitigation of Node Replication with Pulse Delay Attacks in Wireless Sensor Network
    Umrao, Sachin
    Verma, Deeksha
    Tripathi, Arun Kumar
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 390 - +
  • [13] Detecting node replication attacks in mobile sensor networks: theory and approaches
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 496 - 507
  • [14] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69
  • [15] Node coloring based replica detection technique in wireless sensor networks
    Alekha Kumar Mishra
    Ashok Kumar Turuk
    Wireless Networks, 2014, 20 : 2419 - 2435
  • [16] Node coloring based replica detection technique in wireless sensor networks
    Mishra, Alekha Kumar
    Turuk, Ashok Kumar
    WIRELESS NETWORKS, 2014, 20 (08) : 2419 - 2435
  • [17] A comparative analysis of node replica detection schemes in wireless sensor networks
    Mishra, Alekha Kumar
    Turuk, Ashok Kumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 21 - 32
  • [18] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [19] Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiaoming
    Xiong, Yan
    Chen, Depin
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 225 - 232
  • [20] A Review on Node Replication Attack Identification Schemes in WSN
    Kaur, Harpreet
    Saxena, Sharad
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,