An asynchronous node replication attack in wireless sensor networks

被引:0
|
作者
Zhou, Jianying [1 ]
Das, Tanmoy Kanti
Lopez, Javier [2 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Univ Malaga, Comp Sci Dept, E-29071 Malaga, Spain
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
wireless sensor network security; node replication attack; distributed detection protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant is the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, And one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
引用
收藏
页码:125 / +
页数:3
相关论文
共 49 条
  • [31] An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks
    Zhao, Jingying
    Guo, Hai
    Wei, Wei
    COMPUTATIONAL MECHANICS, MATERIALS AND ENGINEERING APPLICATIONS, 2012, 147 : 320 - 323
  • [32] Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
    Yang, Yanjiang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 285 - +
  • [33] Secure data aggregation using access control and authentication for wireless sensor networks
    Razaque, Abdul
    Rizvi, Syed S.
    COMPUTERS & SECURITY, 2017, 70 : 532 - 545
  • [34] Residual energy-based replica detection scheme for mobile wireless sensor networks
    Mishra, Alekha Kumar
    Turuk, Ashok Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 637 - 648
  • [35] A NOVEL ZONE BASED ROUTING PROTOCOL FOR DETECTION OF REPLICAS IN STATIC WIRELESS SENSOR NETWORKS
    Usha, N. S.
    Anita, E. A. Mary
    2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [36] Detecting Replicated Nodes in Wireless Sensor Networks using Random Walks and Network Division
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, N. M.
    Xaing, Yang
    Luan, Tom H.
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2623 - 2628
  • [37] TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks
    Mali, Goutam
    Misra, Sudip
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1978 - 1991
  • [38] Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
    Tiberti, Walter
    Caruso, Federica
    Pomante, Luigi
    Pugliese, Marco
    Santic, Marco
    Santucci, Fortunato
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (10):
  • [39] Evolution of Wireless Sensor Network Security
    Yang Xiaomei
    Ma Ke
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [40] Application independent dynamic group-based key establishment for large-scale wireless sensor networks
    Kifayat, Kashif
    Merabti, Madjid
    Shi, Qi
    Liewellyn-Jones, David
    CHINA COMMUNICATIONS, 2007, 4 (01) : 14 - 27