Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks

被引:0
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Sapienza Univ Roma, Dipartimento Informat, I-00198 Rome, Italy
关键词
Wireless sensor network security; node capture attack detection; distributed protocol; resilience; efficiency; node revocation; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the most, vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node front the network as the first step for further different types of attacks. For example, the adversary can collect all the cryptographic material stored in the node. Also, the node can be reprogrammed and re-deployed in the network in order to perform malicious activities. To the best of our knowledge no distributed solution has been proposed to detect a node capture in a mobile wireless sensor network. fit this paper we propose air efficient and distributed solution to this problem leveraging emergent properties of mobile wireless sensor networks. In particular, we introduce two solutions: SDD, that does not require explicit information exchange between the nodes during the local detection, and CCD, a more sophisticated protocol that uses local node cooperation in addition to mobility to greatly improve performance. We also introduce a benchmark to compare these solutions with. Experimental results demonstrate the feasibility of our proposal. For instance, while the benchmark requires about 9,000 seconds to detect node captures, CDD requires less than 2,000 seconds. These results support, our intuition that node mobility, in conjunction with a limited amount of local cooperation, can be used to detect emergent global properties.
引用
收藏
页码:214 / 219
页数:6
相关论文
共 50 条
  • [21] Racemote: A mobile node for wireless sensor networks
    Song, Guangming
    Zhuang, Wei
    Wei, Zhigang
    Song, Aiguo
    2006 IEEE SENSORS, VOLS 1-3, 2006, : 781 - +
  • [22] IMPACT OF CLONE NODE ATTACK ON WIRELESS SENSOR NETWORKS
    Lalar, Sachin
    Bhushan, Shashi
    Surender
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 731 - 740
  • [23] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [24] Modeling Node Capture Attacks in Wireless Sensor Networks
    Tague, Patrick
    Poovendran, Radha
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1221 - 1224
  • [25] Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks
    Lou, Yanxiang
    Zhang, Yong
    Liu, Shengli
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2798 - 2803
  • [26] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [27] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, 26 (04) : 732 - 743
  • [28] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [29] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [30] An Efficient Energy based Detection of Malicious Node in Mobile Wireless Sensor Networks
    Sharmila S.
    Umamaheswari G.
    Journal of The Institution of Engineers (India): Series B, 2012, 93 (1) : 25 - 30