An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks

被引:36
作者
Zhou, Yuping [1 ]
Huang, Zhenjie [1 ]
Wang, Juan [1 ]
Huang, Rufeng [1 ]
Yu, Dongmei [2 ]
机构
[1] Minnan Normal Univ, Coll Comp Sci, Zhangzhou 363000, Peoples R China
[2] Jiangsu Univ Technol, Coll Elect & Informat Engn, Changzhou 213001, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Linear multicast; Node replication attacks; Random verification; REPLICATION ATTACKS; DISTRIBUTED DETECTION;
D O I
10.1186/1687-1499-2014-163
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication attacks. Our scheme distributes node location information to multiple randomly selected cells and then linear-multicasts the information for verification from the localized cells. Simulation results show that the proposed protocol improves detection efficiency compared with various existing protocols and prolongs the lifetime of the overall network.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 28 条
[21]   NON-CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION IN WIRELESS NETWORKS [J].
Zeng, Kai ;
Govindan, Kannan ;
Mohapatra, Prasant .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) :56-62
[22]   Query Representation with Global Consistency on User Click Graphs [J].
Zhang, Daqiang ;
Zhu, Rongbo ;
Men, Shuaiqiu ;
Raychoudhury, Vaskar .
JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (05) :759-769
[23]   Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks [J].
Zhang, Ming ;
Khanapure, Vishal ;
Chen, Shigang ;
Xiao, Xuelian .
2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, :284-293
[24]   Efficient distributed detection of node replication attacks in sensor networks [J].
Zhu, Bo ;
Setia, Sanjeev ;
Addada, Venkata Gopala Krishna ;
Jajodia, Sushil ;
Roy, Sankardas .
TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, :257-+
[25]   Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks [J].
Zhu, Bo ;
Setia, Sanjeev ;
Jajodia, Sushil ;
Roy, Sankardas ;
Wang, Lingyu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (07) :913-926
[26]   Adaptive Packet Scheduling Scheme to Support Real-time Traffic in WLAN Mesh Networks [J].
Zhu, Rongbo ;
Qin, Yingying ;
Lai, Chin-Feng .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09) :1492-1512
[27]   Detecting node replication attacks in mobile sensor networks: theory and approaches [J].
Zhu, Wen Tao ;
Zhou, Jianying ;
Deng, Robert H. ;
Bao, Feng .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) :496-507
[28]   Hierarchical Node Replication Attacks Detection in Wireless Sensors Networks [J].
Znaidi, Wassim ;
Minier, Marine ;
Ubeda, Stephane .
2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, :82-86