Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks

被引:0
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Sapienza Univ Roma, Dipartimento Informat, I-00198 Rome, Italy
关键词
Wireless sensor network security; node capture attack detection; distributed protocol; resilience; efficiency; node revocation; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the most, vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node front the network as the first step for further different types of attacks. For example, the adversary can collect all the cryptographic material stored in the node. Also, the node can be reprogrammed and re-deployed in the network in order to perform malicious activities. To the best of our knowledge no distributed solution has been proposed to detect a node capture in a mobile wireless sensor network. fit this paper we propose air efficient and distributed solution to this problem leveraging emergent properties of mobile wireless sensor networks. In particular, we introduce two solutions: SDD, that does not require explicit information exchange between the nodes during the local detection, and CCD, a more sophisticated protocol that uses local node cooperation in addition to mobility to greatly improve performance. We also introduce a benchmark to compare these solutions with. Experimental results demonstrate the feasibility of our proposal. For instance, while the benchmark requires about 9,000 seconds to detect node captures, CDD requires less than 2,000 seconds. These results support, our intuition that node mobility, in conjunction with a limited amount of local cooperation, can be used to detect emergent global properties.
引用
收藏
页码:214 / 219
页数:6
相关论文
共 50 条
  • [31] Sybil Attack Detection In Wireless Sensor Networks
    Zhukabayeva, T. K.
    Mardenov, E. M.
    Abdildaeva, A. A.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [32] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [33] Detection of Wormhole Attack in Wireless Sensor Networks
    Yadav, Jyoti
    Kumar, Mukesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 243 - 250
  • [34] Wormhole Attack Detection in Wireless Sensor Networks
    Bendjima, Mostefa
    Feham, Mohammed
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1319 - 1326
  • [35] Game-Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks
    Zhu, Quanyan
    Bushnell, Linda
    Basar, Tamer
    2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2012, : 3404 - 3411
  • [36] Design and implementation of a mobile node for wireless sensor networks
    Department of Instrument Science and Engineering, Southeast University, Nanjing 210096, China
    Jilin Daxue Xuebao (Gongxueban), 2007, 4 (939-943):
  • [37] Failure node identification in mobile wireless sensor networks
    Satyanarayana, Gunupusala
    Rani, Rayavarapu Sandhya
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [38] Efficient node discovery in mobile wireless sensor networks
    Dyo, Vladimir
    Mascolo, Cecilia
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, 2008, 5067 : 478 - +
  • [39] Time Synchronization for Wireless Sensor Networks with a Mobile Node
    Wu, Xiaoming
    Wang, Yinglong
    Wang, Fuqiang
    Zeng, Peng
    Xiao, Yang
    Han, Wenlin
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 36 (1-4) : 175 - 191
  • [40] Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink
    Guerroumi, Mohamed
    Derhab, Abdelouahid
    Saleem, Kashif
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 307 - 313