Detecting node replication attacks in mobile sensor networks: theory and approaches
A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With th...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1626 http://dx.doi.org/10.1002/sec.338 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2625 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-26252013-01-10T07:09:08Z Detecting node replication attacks in mobile sensor networks: theory and approaches ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With the revealed secret credentials, the adversary can create many duplicate nodes that are seemingly legitimate, and deploy them into the network to cripple the monitoring applications. Defending against node replication attacks has become an important research topic in sensor network security, but so far, not many solutions have been proposed, most of which adopt a stationary network model where sensor nodes are fixed and immobile. In this work, we address the problem of detecting node replication attacks in a mobile sensor network, where each sensor node freely and randomly roams in the sensing region all the time, and one node meets with another in an occasional and unpredictable manner. For replication attacks where the replicas do not conspire, we employ very lightweight token-based authentication as a detection approach. In case the replicas conspire by communicating with each other in an efficient manner, we harness the random encounters between physical nodes and propose a detection method based on statistics. Compared with existent solutions, our detections have the nice feature that sensor nodes are freed from the fragile assumption that they can correctly obtain their geographic positions, and that even loose time synchronization may be unnecessary. 2012-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1626 info:doi/10.1002/sec.338 http://dx.doi.org/10.1002/sec.338 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University mobile sensor network patrol robot system security node replication attack detection Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
mobile sensor network patrol robot system security node replication attack detection Information Security |
spellingShingle |
mobile sensor network patrol robot system security node replication attack detection Information Security ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng Detecting node replication attacks in mobile sensor networks: theory and approaches |
description |
A wireless sensor network composed of a number of sensor nodes is often deployed in unattended and harsh environments to perform various monitoring tasks. Due to cost concerns, usually, sensor nodes are not made tamper-resistant, and a captured node may be easily compromised by an adversary. With the revealed secret credentials, the adversary can create many duplicate nodes that are seemingly legitimate, and deploy them into the network to cripple the monitoring applications. Defending against node replication attacks has become an important research topic in sensor network security, but so far, not many solutions have been proposed, most of which adopt a stationary network model where sensor nodes are fixed and immobile. In this work, we address the problem of detecting node replication attacks in a mobile sensor network, where each sensor node freely and randomly roams in the sensing region all the time, and one node meets with another in an occasional and unpredictable manner. For replication attacks where the replicas do not conspire, we employ very lightweight token-based authentication as a detection approach. In case the replicas conspire by communicating with each other in an efficient manner, we harness the random encounters between physical nodes and propose a detection method based on statistics. Compared with existent solutions, our detections have the nice feature that sensor nodes are freed from the fragile assumption that they can correctly obtain their geographic positions, and that even loose time synchronization may be unnecessary. |
format |
text |
author |
ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng |
author_facet |
ZHU, Wen Tao Zhou, Jianying DENG, Robert H. Bao, Feng |
author_sort |
ZHU, Wen Tao |
title |
Detecting node replication attacks in mobile sensor networks: theory and approaches |
title_short |
Detecting node replication attacks in mobile sensor networks: theory and approaches |
title_full |
Detecting node replication attacks in mobile sensor networks: theory and approaches |
title_fullStr |
Detecting node replication attacks in mobile sensor networks: theory and approaches |
title_full_unstemmed |
Detecting node replication attacks in mobile sensor networks: theory and approaches |
title_sort |
detecting node replication attacks in mobile sensor networks: theory and approaches |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2012 |
url |
https://ink.library.smu.edu.sg/sis_research/1626 http://dx.doi.org/10.1002/sec.338 |
_version_ |
1770571355076427776 |