LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems

被引:81
作者
Dong, Mianxiong [1 ]
Ota, Kaoru [1 ]
Yang, Laurence T. [2 ]
Liu, Anfeng [3 ]
Guo, Minyi [4 ]
机构
[1] Muroran Inst Technol, Elect & Informat Engn Dept, Muroran, Hokkaido 0508585, Japan
[2] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200240, Peoples R China
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Clone detection; distributed route; network lifetime; wireless sensor network (WSN) security; DISTRIBUTED DETECTION; SENSOR; ATTACKS; LIFETIME;
D O I
10.1109/TCAD.2016.2539327
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPSs) have recently become an important research field not only because of their important and varied application scenarios, including transportation systems, smart homes, surveillance systems, and wearable devices but also because the fundamental infrastructure has yet to be well addressed. Wireless sensor networks (WSNs), as a type of supporting infrastructure, play an irreplaceable role in CPS design. Specifically, secure communication in WSNs is vital because information transferred in the networks can be easily stolen or replaced. Therefore, this paper presents a novel distributed low-storage clone detection protocol (LSCD) for WSNs. We first design a detection route along the perpendicular direction of a witness path with witness nodes deployed in a ring path. This ensures that the detection route must encounter the witness path because the distance between any two detection routes must be smaller than the witness path length. In the LSCD protocol, clone detection is processed in a nonhotspot region where a large amount of energy remains, which can improve energy efficiency as well as network lifetime. Extensive simulations demonstrate that the lifetime, storage requirements, and detection probability of our protocol are substantially improved over competing solutions from the literature.
引用
收藏
页码:712 / 723
页数:12
相关论文
共 26 条
[1]  
[Anonymous], P IEEE INFOCOM
[2]   On the detection of clones in sensor networks using random key predistribution [J].
Brooks, Richard ;
Govindaraju, P. Y. ;
Pirretti, Matthew ;
Vijaykrishnan, N. ;
Kandemir, Mahmut T. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1246-1258
[3]   SET: Detecting node clones in sensor networks [J].
Choi, Heesook ;
Zhu, Sencun ;
La Porta, Thomas F. .
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, :341-350
[4]   A Framework for Energy-Consumption-Based Design Space Exploration for Wireless Sensor Nodes [J].
Chouhan, Sonali ;
Bose, Ranjan ;
Balakrishnan, M. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, 28 (07) :1017-1024
[5]   Distributed Detection of Clone Attacks in Wireless Sensor Networks [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi Vincenzo ;
Mei, Alessandro .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :685-698
[6]   Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks [J].
Dong, Mianxiong ;
Ota, Kaoru ;
Liu, Anfeng ;
Guo, Minyi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) :225-236
[7]   QOE-ENSURED PRICE COMPETITION MODEL FOR EMERGING MOBILE NETWORKS [J].
Dong, Mianxiong ;
Liu, Xiao ;
Qian, Zhuzhong ;
Liu, Anfeng ;
Wang, Tao .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (04) :50-57
[8]   Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks [J].
Dong, Mianxiong ;
Ota, Kaoru ;
Yang, Laurence T. ;
Chang, Shan ;
Zhu, Hongzi ;
Zhou, Zhenyu .
COMPUTER NETWORKS, 2014, 74 :58-70
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]   Distributed detection of mobile malicious node attacks in wireless sensor networks [J].
Ho, Jun-Won ;
Wright, Matthew ;
Das, Sajal K. .
AD HOC NETWORKS, 2012, 10 (03) :512-523