A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems

被引:39
作者
Li, Longpeng [1 ]
Xu, Guangquan [1 ,2 ]
Jiao, Litao [2 ]
Li, Xiaotong [1 ]
Wang, Hao [3 ]
Hu, Jing [4 ]
Xian, Hequn [5 ]
Lian, Wenjuan [6 ]
Gao, Honghao [7 ]
机构
[1] Tianjin Univ, Tianjin Key Lab Adv Networking, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[2] Qingdao Huanghai Univ, Qingdao 266427, Peoples R China
[3] Norwegian Univ Sci & Technol, Dept Comp Sci, N-7491 Trondheim, Norway
[4] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[5] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[6] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[7] Shanghai Univ, Ctr Comp, Shanghai 200444, Peoples R China
基金
美国国家科学基金会;
关键词
Industrial Internet of Things; node replication attack; random key distribution; wireless sensor system (WSS); PROTOCOL;
D O I
10.1109/TII.2019.2927296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide deployment of wireless sensor networks in smart industrial systems, lots of unauthorized attacking from the adversary are greatly threatening the security and privacy of the entire industrial systems, of which node replication attacks can hardly be defended, since it is conducted in the physical layer. To solve this problem, we propose a secure random key distribution (SRKD) scheme, which provides a new method for the defense against the attack. Specifically, we combine a localized algorithm with a voting mechanism to support the detection and revocation of malicious nodes. We further change the meaning of the parameter s to help prevent the replication attack. Furthermore, the experimental results show that the detection ratio of replicate nodes exceeds 90% when the number of network nodes reaches 200, which demonstrates the security and effectiveness of our scheme. Compared with existing state-of-the-art schemes, the SRKD scheme also has good storage and communication efficiency.
引用
收藏
页码:2091 / 2101
页数:11
相关论文
共 20 条
[1]   Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed [J].
Cao, Xianghui ;
Chen, Jiming ;
Xiao, Yang ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) :3596-3605
[2]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[3]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80
[4]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[5]   A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-Composite [J].
Gandino, Filippo ;
Ferrero, Renato ;
Rebaudengo, Maurizio .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) :34-47
[6]   A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network [J].
Liu, Xiao ;
Xiong, Naixue ;
Zhang, Ning ;
Liu, Anfeng ;
Shen, Hailan ;
Huang, Changqin .
IEEE ACCESS, 2018, 6 :3882-3898
[7]   Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks [J].
Luo, Juan ;
Hu, Jinyu ;
Wu, Di ;
Li, Renfa .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (01) :112-121
[8]   Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms [J].
Oliveira, Luis Miguel L. ;
Rodrigues, Joel J. P. C. ;
de Sousa, Amaro F. ;
Denisov, Victor M. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) :2186-2195
[9]   Cyber security attacks to modern vehicular systems [J].
Pan, L. ;
Zheng, X. ;
Chen, H. X. ;
Luan, T. ;
Bootwala, H. ;
Batten, L. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 :90-100
[10]   Distributed detection of node replication attacks in sensor networks [J].
Parno, B ;
Perrig, A ;
Gligor, V .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :49-63