An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks

被引:36
作者
Zhou, Yuping [1 ]
Huang, Zhenjie [1 ]
Wang, Juan [1 ]
Huang, Rufeng [1 ]
Yu, Dongmei [2 ]
机构
[1] Minnan Normal Univ, Coll Comp Sci, Zhangzhou 363000, Peoples R China
[2] Jiangsu Univ Technol, Coll Elect & Informat Engn, Changzhou 213001, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Linear multicast; Node replication attacks; Random verification; REPLICATION ATTACKS; DISTRIBUTED DETECTION;
D O I
10.1186/1687-1499-2014-163
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication attacks. Our scheme distributes node location information to multiple randomly selected cells and then linear-multicasts the information for verification from the localized cells. Simulation results show that the proposed protocol improves detection efficiency compared with various existing protocols and prolongs the lifetime of the overall network.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2012, BMC GENOMICS, DOI DOI 10.1186/1471-2105-13-S5-S1
[2]  
[Anonymous], 2013, INT J DISTRIB SENS N
[3]   On the detection of clones in sensor networks using random key predistribution [J].
Brooks, Richard ;
Govindaraju, P. Y. ;
Pirretti, Matthew ;
Vijaykrishnan, N. ;
Kandemir, Mahmut T. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1246-1258
[4]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[5]  
Chia-Mu Yu, 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P290, DOI 10.1109/PerComW.2012.6197497
[6]  
Chia-Mu Yu, 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, P597, DOI 10.1109/SAHCN.2008.82
[7]   SET: Detecting node clones in sensor networks [J].
Choi, Heesook ;
Zhu, Sencun ;
La Porta, Thomas F. .
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, :341-350
[8]   Requirements and open issues in distributed detection of node identity replicas in WSN [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Mei, Alessandro .
2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, :1468-+
[9]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80
[10]   A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks [J].
Deng, Xiao-Ming ;
Xiong, Yan .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) :732-743