Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis

被引:43
作者
Ho, Jun-Won [1 ]
Wright, Matthew [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
来源
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5 | 2009年
关键词
D O I
10.1109/INFCOM.2009.5062097
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, generate their replicas, and thus mount a variety of attacks with these replicas. Such attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our scheme provides effective and robust replica detection capability with reasonable overheads.
引用
收藏
页码:1773 / 1781
页数:9
相关论文
共 14 条
[1]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[2]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80
[3]  
Dantu K, 2005, 2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P404
[4]  
Hu L., 2004, MOBICOM 04
[5]  
Jung J, 2004, P IEEE S SECUR PRIV, P211
[6]  
Le Boudec JY, 2005, IEEE INFOCOM SER, P2743
[7]  
LIU A, 2007, TR200736 N CAR STAT
[8]  
PALCHAUDHURI S, 2005, 38 ANN SIM S APR
[9]   Distributed detection of node replication attacks in sensor networks [J].
Parno, B ;
Perrig, A ;
Gligor, V .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :49-63
[10]   Attack-resilient time synchronization for wireless sensor networks [J].
Song, Hui ;
Zhu, Sencun ;
Cao, Guohong .
AD HOC NETWORKS, 2007, 5 (01) :112-125