Detecting node replication attacks in mobile sensor networks: theory and approaches

A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With th...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU, Wen Tao, Zhou, Jianying, DENG, Robert H., Bao, Feng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2012
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1626
http://dx.doi.org/10.1002/sec.338
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2625
record_format dspace
spelling sg-smu-ink.sis_research-26252013-01-10T07:09:08Z Detecting node replication attacks in mobile sensor networks: theory and approaches ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With the revealed secret credentials, the adversary can create many duplicate nodes that are seemingly legitimate, and deploy them into the network to cripple the monitoring applications. Defending against node replication attacks has become an important research topic in sensor network security, but so far, not many solutions have been proposed, most of which adopt a stationary network model where sensor nodes are fixed and immobile. In this work, we address the problem of detecting node replication attacks in a mobile sensor network, where each sensor node freely and randomly roams in the sensing region all the time, and one node meets with another in an occasional and unpredictable manner. For replication attacks where the replicas do not conspire, we employ very lightweight token-based authentication as a detection approach. In case the replicas conspire by communicating with each other in an efficient manner, we harness the random encounters between physical nodes and propose a detection method based on statistics. Compared with existent solutions, our detections have the nice feature that sensor nodes are freed from the fragile assumption that they can correctly obtain their geographic positions, and that even loose time synchronization may be unnecessary. 2012-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1626 info:doi/10.1002/sec.338 http://dx.doi.org/10.1002/sec.338 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University mobile sensor network patrol robot system security node replication attack detection Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic mobile sensor network
patrol robot system
security
node replication attack
detection
Information Security
spellingShingle mobile sensor network
patrol robot system
security
node replication attack
detection
Information Security
ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
Detecting node replication attacks in mobile sensor networks: theory and approaches
description A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With the revealed secret credentials, the adversary can create many duplicate nodes that are seemingly legitimate, and deploy them into the network to cripple the monitoring applications. Defending against node replication attacks has become an important research topic in sensor network security, but so far, not many solutions have been proposed, most of which adopt a stationary network model where sensor nodes are fixed and immobile. In this work, we address the problem of detecting node replication attacks in a mobile sensor network, where each sensor node freely and randomly roams in the sensing region all the time, and one node meets with another in an occasional and unpredictable manner. For replication attacks where the replicas do not conspire, we employ very lightweight token-based authentication as a detection approach. In case the replicas conspire by communicating with each other in an efficient manner, we harness the random encounters between physical nodes and propose a detection method based on statistics. Compared with existent solutions, our detections have the nice feature that sensor nodes are freed from the fragile assumption that they can correctly obtain their geographic positions, and that even loose time synchronization may be unnecessary.
format text
author ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
author_facet ZHU, Wen Tao
Zhou, Jianying
DENG, Robert H.
Bao, Feng
author_sort ZHU, Wen Tao
title Detecting node replication attacks in mobile sensor networks: theory and approaches
title_short Detecting node replication attacks in mobile sensor networks: theory and approaches
title_full Detecting node replication attacks in mobile sensor networks: theory and approaches
title_fullStr Detecting node replication attacks in mobile sensor networks: theory and approaches
title_full_unstemmed Detecting node replication attacks in mobile sensor networks: theory and approaches
title_sort detecting node replication attacks in mobile sensor networks: theory and approaches
publisher Institutional Knowledge at Singapore Management University
publishDate 2012
url https://ink.library.smu.edu.sg/sis_research/1626
http://dx.doi.org/10.1002/sec.338
_version_ 1770571355076427776