A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems

被引:39
作者
Li, Longpeng [1 ]
Xu, Guangquan [1 ,2 ]
Jiao, Litao [2 ]
Li, Xiaotong [1 ]
Wang, Hao [3 ]
Hu, Jing [4 ]
Xian, Hequn [5 ]
Lian, Wenjuan [6 ]
Gao, Honghao [7 ]
机构
[1] Tianjin Univ, Tianjin Key Lab Adv Networking, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[2] Qingdao Huanghai Univ, Qingdao 266427, Peoples R China
[3] Norwegian Univ Sci & Technol, Dept Comp Sci, N-7491 Trondheim, Norway
[4] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[5] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[6] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[7] Shanghai Univ, Ctr Comp, Shanghai 200444, Peoples R China
基金
美国国家科学基金会;
关键词
Industrial Internet of Things; node replication attack; random key distribution; wireless sensor system (WSS); PROTOCOL;
D O I
10.1109/TII.2019.2927296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide deployment of wireless sensor networks in smart industrial systems, lots of unauthorized attacking from the adversary are greatly threatening the security and privacy of the entire industrial systems, of which node replication attacks can hardly be defended, since it is conducted in the physical layer. To solve this problem, we propose a secure random key distribution (SRKD) scheme, which provides a new method for the defense against the attack. Specifically, we combine a localized algorithm with a voting mechanism to support the detection and revocation of malicious nodes. We further change the meaning of the parameter s to help prevent the replication attack. Furthermore, the experimental results show that the detection ratio of replicate nodes exceeds 90% when the number of network nodes reaches 200, which demonstrates the security and effectiveness of our scheme. Compared with existing state-of-the-art schemes, the SRKD scheme also has good storage and communication efficiency.
引用
收藏
页码:2091 / 2101
页数:11
相关论文
共 20 条
[11]   Practical overview of security issues in wireless sensor network applications [J].
Radhappa H. ;
Pan L. ;
Xi Zheng J. ;
Wen S. .
International Journal of Computers and Applications, 2018, 40 (04) :202-213
[12]   Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks [J].
Ren, Ju ;
Zhang, Yaoxue ;
Zhang, Kuan ;
Liu, Anfeng ;
Chen, Jianer ;
Shen, Xuemin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) :788-800
[13]   BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks [J].
Shim, Kyung-Ah .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) :1545-1554
[14]  
Xing YF, 2010, PROCEEDINGS OF THE ASME TURBO EXPO 2010, VOL 4, PTS A AND B, P1
[15]   CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems [J].
Xu, Guangquan ;
Zhang, Yao ;
Sangaiah, Arun Kumar ;
Li, Xiaohong ;
Castiglione, Aniello ;
Zheng, Xi .
INFORMATION SCIENCES, 2019, 476 :505-515
[16]   A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks [J].
Xu, Guangquan ;
Liu, Jia ;
Lu, Yanrong ;
Zeng, Xianjiao ;
Zhang, Yao ;
Li, Xiaoming .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 107 :83-92
[17]   Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things [J].
Xu, Guangquan ;
Cao, Yan ;
Ren, Yuanyuan ;
Li, Xiaohong ;
Feng, Zhiyong .
IEEE ACCESS, 2017, 5 :21046-21056
[18]   Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks [J].
Yu, Chia-Mu ;
Tsou, Yao-Tung ;
Lu, Chun-Shien ;
Kuo, Sy-Yen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) :754-768
[19]   E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT [J].
Zeng, Xianjiao ;
Xu, Guangquan ;
Zheng, Xi ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1506-1519
[20]   Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks [J].
Zhu, Bo ;
Setia, Sanjeev ;
Jajodia, Sushil ;
Roy, Sankardas ;
Wang, Lingyu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (07) :913-926