A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks

被引:0
作者
Xiao-Ming Deng
Yan Xiong
机构
[1] University of Science and Technology of China,School of Computer Science and Technology
来源
Journal of Computer Science and Technology | 2011年 / 26卷
关键词
node replication attack; network security; mobile WSN (wireless sensor network); random waypoint model;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are often deployed in harsh environments. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed, yet they are not very suitable for the mobile wireless sensor networks. In this paper, we propose a new protocol to detect the replicas in mobile WSNs. In this protocol, polynomial-based pair-wise key pre-distribution scheme and Counting Bloom Filters are used to guarantee that the replicas can never lie about their real identifiers and collect the number of pair-wise keys established by each sensor node. Replicas are detected by looking at whether the number of pair-wise keys established by them exceeds the threshold. We also derive accurate closed form expression for the expected number of pair-wise keys established by each node, under commonly used random waypoint model. Analyses and simulations verify that the protocol accurately detects the replicas in the mobile WSNs and supports their removal.
引用
收藏
页码:732 / 743
页数:11
相关论文
共 30 条
[1]  
Akyildiz IF(2002)A survey on sensor networks IEEE Communications Magazine 40 102-114
[2]  
Su W(2003)Security and privacy in sensor networks Computer 36 103-105
[3]  
Sankarasubramaniam Y(2007)On the detection of clones in sensor networks using random key predistribution IEEE Trans. Systems, Man, and Cybernetics 37 1246-1258
[4]  
Cayirci E(1996)Dynamic source routing in ad hoc wireless networks Mobile Computing 353 153-181
[5]  
Chan H(2008)A new approach for time synchronization in wireless wensor networks: Pairwise broadcast synchronization IEEE Trans. Wireless Communications 7 3318-3322
[6]  
Perrig A(2002)SPINS: Security protocols for sensor networks Wirel. Netw. 8 521-534
[7]  
Brooks R(1970)Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 422-426
[8]  
Govindaraju PY(2000)Summary cache: A scalable wide-area Web cache sharing protocol IEEE/ACM Trans. Networking 8 281-293
[9]  
Pirretti M(1952)A method for the construction of minimum-redundancy codes Proc. I.R.E. 40 1098-1101
[10]  
Vijaykrishnan N(2002)Routing security in wireless ad hoc networks Communications Magazine, IEEE 40 70-75