Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks

被引:0
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Sapienza Univ Roma, Dipartimento Informat, I-00198 Rome, Italy
关键词
Wireless sensor network security; node capture attack detection; distributed protocol; resilience; efficiency; node revocation; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the most, vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node front the network as the first step for further different types of attacks. For example, the adversary can collect all the cryptographic material stored in the node. Also, the node can be reprogrammed and re-deployed in the network in order to perform malicious activities. To the best of our knowledge no distributed solution has been proposed to detect a node capture in a mobile wireless sensor network. fit this paper we propose air efficient and distributed solution to this problem leveraging emergent properties of mobile wireless sensor networks. In particular, we introduce two solutions: SDD, that does not require explicit information exchange between the nodes during the local detection, and CCD, a more sophisticated protocol that uses local node cooperation in addition to mobility to greatly improve performance. We also introduce a benchmark to compare these solutions with. Experimental results demonstrate the feasibility of our proposal. For instance, while the benchmark requires about 9,000 seconds to detect node captures, CDD requires less than 2,000 seconds. These results support, our intuition that node mobility, in conjunction with a limited amount of local cooperation, can be used to detect emergent global properties.
引用
收藏
页码:214 / 219
页数:6
相关论文
共 50 条
  • [1] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [2] Node capture attack detection and defence in wireless sensor networks
    Jokhio, S. H.
    Jokhio, I. A.
    Kemp, A. H.
    IET WIRELESS SENSOR SYSTEMS, 2012, 2 (03) : 161 - 169
  • [3] Maximizing destructiveness of node capture attack in wireless sensor networks
    Chi Lin
    Guowei Wu
    Chang Wu Yu
    Lin Yao
    The Journal of Supercomputing, 2015, 71 : 3181 - 3212
  • [4] Modeling a node capture attack in a secure Wireless Sensor Networks
    Smache, Meriem
    El Mrabet, Nadia
    Gilquijano, Jesus-Javier.
    Tria, Assia
    Riou, Emmanuel
    Gregory, Chaput
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 188 - 193
  • [5] Maximizing destructiveness of node capture attack in wireless sensor networks
    Lin, Chi
    Wu, Guowei
    Yu, Chang Wu
    Yao, Lin
    JOURNAL OF SUPERCOMPUTING, 2015, 71 (08): : 3181 - 3212
  • [6] Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
    Zhao, Jun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (10) : 6714 - 6734
  • [7] Node Replication Attack Detection in Distributed Wireless Sensor Networks
    Sujihelen, L.
    Boddu, Rajasekhar
    Murugaveni, S.
    Arnika, Ms
    Haldorai, Anandakumar
    Reddy, Pundru Chandra Shaker
    Feng, Suili
    Qin, Jiayin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] A low-cost node capture attack algorithm for wireless sensor networks
    Lin, Chi
    Wu, Guowei
    Qiu, Tie
    Deng, Jing
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (07) : 1251 - 1268
  • [9] MREA: a minimum resource expenditure node capture attack in wireless sensor networks
    Lin, Chi
    Qiu, Tie
    Obaidat, Mohammad S.
    Yu, Chang Wu
    Yao, Lin
    Wu, Guowei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5502 - 5517
  • [10] Node Capture Attack in Wireless Sensor Network: A Survey
    Bharathi, M. Vivekananda
    Tanguturi, Rama Chaithanya
    Jayakumar, C.
    Selvamani, K.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 340 - 342