An asynchronous node replication attack in wireless sensor networks

被引:0
|
作者
Zhou, Jianying [1 ]
Das, Tanmoy Kanti
Lopez, Javier [2 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Univ Malaga, Comp Sci Dept, E-29071 Malaga, Spain
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
wireless sensor network security; node replication attack; distributed detection protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant is the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, And one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
引用
收藏
页码:125 / +
页数:3
相关论文
共 49 条
  • [41] Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks
    Kashif Kifayat
    Madjid Merabti
    David Llewellyn-Jones
    中国通信, 2007, 4 (01) : 14 - 27
  • [42] An Active Defense Model with Low Power Consumption and Deviation for Wireless Sensor Networks Utilizing Evolutionary Game Theory
    Al-Jaoufi, Mohammed Ahmed Ahmed
    Liu, Yun
    Zhang, Zhenjiang
    ENERGIES, 2018, 11 (05)
  • [43] Distributed Clone Detection in Mobile Sensor Networks
    Chowdhury, Abu Sayed
    Dhawan, Akshaye
    SENSORNETS: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2017, : 135 - 141
  • [44] Efficient online/offline identity-based signature for wireless sensor network
    Joseph K. Liu
    Joonsang Baek
    Jianying Zhou
    Yanjiang Yang
    Jun Wen Wong
    International Journal of Information Security, 2010, 9 : 287 - 296
  • [45] Efficient online/offline identity-based signature for wireless sensor network
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    Yang, Yanjiang
    Wong, Jun Wen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 287 - 296
  • [46] Power Consumption Analysis Model in Wireless Sensor Network for Different Topology Protocols and Lightweight Cryptographic Algorithms
    Radosavljevic, Nemanja
    Babic, Djordje
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (01): : 71 - 80
  • [47] Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Shaukat, Muhammad Arslan
    Alezabi, Kamal Ali
    SENSORS, 2020, 20 (08)
  • [48] Randomized Multipath Routing Protocol for Secure Data Transmission in Wireless IP-over-WDM Networks
    Mariappan, Ramasamy
    Shriram, K.
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 204 - 209
  • [49] A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology
    Khan, M. Saud
    Khan, Noor M.
    Khan, Ahmad
    Aadil, Farhan
    Tahir, M.
    Sardaraz, M.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (05):