A defense against clock skew replication attacks in wireless sensor networks

被引:15
作者
Huang, Ding-Jie [1 ]
Teng, Wei-Chung [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
关键词
Wireless sensor networks; Clock skew; Replication attack; DISTRIBUTED DETECTION; CLONE ATTACKS;
D O I
10.1016/j.jnca.2013.04.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As studies to date have demonstrated that the clock skew of every physical device differs and so is suitable for device identification in network communications, the fact that any adversary can easily produce a fake clock skew by altering the timestamp of the sent packets remains a concern. This study contributes to this issue by realizing a replication attack of an indistinguishable fake clock skew and by developing its countermeasure in a wireless sensor network environment. In the first part of the study, a method of timestamp back calculation is developed for imitating the clock skew of a neighbor node. Given the relative clock skews of a victim node and an imitated node, our method calculates the time difference between the attacker node and the imitated one, which makes the biased timestamps of the attacker node's packets, when measured by the victim node, derive to the exactly the same clock skew as the imitated node. Our experiment results show that the success rate of physical replication attacks ranges from 82.5% to 95%. In the second part of this study, a novel approach is proposed to defend against such clock skew replication attacks. This approach is based on our observation that a precise skew estimation can be performed only when the packets are sent at fixed time intervals. When the time period of the synchronization is changed frequently, our experiments show that the success rate of an attack is considerably reduced to less than 2.4%, or even 0% in most cases. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:26 / 37
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2011, COMP FEM STUD SER, DOI DOI 10.1057/9780230119208
[2]  
[Anonymous], 2006, HOT NOT REVEALING HI, DOI [DOI 10.1145/1180405.1180410, 10.1145/1180405.1180410]
[3]  
[Anonymous], 2004, Proceedings of International Conference on Embedded Networked Sensor Systems (Sensys), DOI [10.1145/1031495.1031501, DOI 10.1145/1031495.1031501]
[4]  
[Anonymous], SECURING FLOODING TI
[5]  
[Anonymous], 2008, P IEEE GLOBECOM IEEE
[6]  
[Anonymous], IEEE WIR COMM NETW C
[7]  
[Anonymous], ISIS06704
[8]  
[Anonymous], 2004, AMBIENT INTELLIGENCE
[9]  
[Anonymous], 2003, Proceedings of the 1st International Conference on Embedded Networks Sensor Systems (SenSys'03), DOI DOI 10.1145/958491.958508
[10]  
[Anonymous], SKEWMASK FRUSTRATING