NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks

被引:19
作者
Huan, Xintao [1 ,2 ]
Kim, Kyeong Soo [2 ]
Zhang, Junqing [1 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
[2] Xian Jiaotong Liverpool Univ, Dept Commun & Networking, Suzhou 215123, Peoples R China
关键词
Node identification; spoofing attack; clock skew; received signal strength; link quality indicator; wireless sensor network; convolutional neural network; TIME SYNCHRONIZATION; WORMHOLE ATTACKS; PHYSICAL DEVICE;
D O I
10.1109/TCOMM.2021.3071448
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensor networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broadcasting. To defend against Spoofing attacks, we propose a new node identification scheme called node identification against Spoofing attack (NISA). It utilizes the reverse time synchronization framework, where sensor nodes' clock skews are estimated at the head of a WSN, and the spatially-correlated radio link information to achieve simultaneous node identification and attack detection. We further provide centralized and distributed NISA for covering both single-hop and multi-hop scenarios, the former of which employs a single-input and multiple-output convolutional neural network. With a real WSN testbed consisting of TelosB sensor nodes running TinyOS, we investigate the identifiability of clock skews under temperature and voltage variations and evaluate the performance of both centralized and distributed NISA. Experimental results demonstrate that both centralized and distributed NISA could provide accurate node identification and Spoofing attack detection.
引用
收藏
页码:4691 / 4703
页数:13
相关论文
共 48 条
[1]   RSS-Based Indoor Localization Using Belief Function Theory [J].
Achroufene, Achour ;
Amirat, Yacine ;
Chibani, Abdelghani .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2019, 16 (03) :1163-1180
[2]  
[Anonymous], 2018, P 2 INT C ADV EL COM
[3]  
[Anonymous], 2016, IEEE WIRELESS COMMUN
[4]   Radio Link Quality Estimation in Wireless Sensor Networks: A Survey [J].
Baccour, Nouha ;
Koubaa, Anis ;
Mottola, Luca ;
Zuniga, Marco Antonio ;
Youssef, Habib ;
Boano, Carlo Alberto ;
Alves, Mario .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 8 (04)
[5]  
Cena G., 2018, PROC IEEE INT WORKSH, P1
[6]   Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks [J].
Chen, Yingying ;
Yang, Jie ;
Trappe, Wade ;
Martin, Richard P. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2418-2434
[7]  
Chollet F., 2015, KERAS 20 COMPUTER SO
[8]   NEAREST NEIGHBOR PATTERN CLASSIFICATION [J].
COVER, TM ;
HART, PE .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (01) :21-+
[9]   Fundamental Limits on Synchronizing Clocks Over Networks [J].
Freris, Nikolaos M. ;
Graham, Scott R. ;
Kumar, P. R. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2011, 56 (06) :1352-1364
[10]  
Fu HR, 2005, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, P134