An asynchronous node replication attack in wireless sensor networks

被引:0
|
作者
Zhou, Jianying [1 ]
Das, Tanmoy Kanti
Lopez, Javier [2 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Univ Malaga, Comp Sci Dept, E-29071 Malaga, Spain
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
wireless sensor network security; node replication attack; distributed detection protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant is the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, And one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
引用
收藏
页码:125 / +
页数:3
相关论文
共 49 条
  • [21] A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems
    Li, Longpeng
    Xu, Guangquan
    Jiao, Litao
    Li, Xiaotong
    Wang, Hao
    Hu, Jing
    Xian, Hequn
    Lian, Wenjuan
    Gao, Honghao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2091 - 2101
  • [22] Imposter detection for replication attacks in mobile sensor networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    COMPUTER NETWORKS, 2016, 108 : 210 - 222
  • [23] Imposter Detection for Replication Attacks in Mobile Sensor Networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [24] Prevention of Node Replication in Wireless Sensor Network using Received Signal Strength Indicator, Link Quality Indicator and Packet Sequence Number
    Roy, Sudipto
    Nene, Manisha J.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [25] Applied Cryptography for Security and Privacy in Wireless Sensor Networks
    Kar, Dulal C.
    Ngo, Hung L.
    Sanapala, Geetha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 14 - 36
  • [26] RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
    Kumar, Pardeep
    Choudhury, Amlan Jyoti
    Sain, Mangal
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2011, 11 (05) : 5020 - 5046
  • [27] LHA-SP: Secure protocols for hierarchical wireless sensor networks
    Oliveira, LB
    Wong, HC
    Loureiro, AA
    INTEGRATED NETWORK MANAGEMENT IX: MANAGING NEW NETWORKED WORLDS, 2005, : 31 - 44
  • [28] Performance Trade-offs of Encryption Algorithms For Wireless Sensor Networks
    Trad, Abdelbasset
    Bahattab, Abdullah Ali
    Ben Othman, Soufiene
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [29] Research on Tolerant Aggression Algorithms for Data Aggregation in Wireless Sensor Networks
    Ren, Kai-jie
    Yu, Jing
    Sun, Sen
    2018 3RD INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL AND ELECTRICAL ENGINEERING (AMEE 2018), 2018, 298 : 337 - 341
  • [30] Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks
    Valero, Marco
    Jung, Sang Shin
    Uluagac, A. Selcuk
    Li, Yingshu
    Beyah, Raheem
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 585 - 593