An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
详细信息    查看全文
  • 作者:Yuping Zhou (1)
    Zhenjie Huang (1)
    Juan Wang (1)
    Rufeng Huang (1)
    Dongmei Yu (2)

    1. College of Computer Science
    ; Minnan Normal University ; Zhangzhou ; 363000 ; China
    2. College of Electrical and Information Engineering
    ; Jiangsu University of Technology ; Changzhou ; 213001 ; China
  • 关键词:Wireless sensor networks ; Linear multicast ; Node replication attacks ; Random verification
  • 刊名:EURASIP Journal on Wireless Communications and Networking
  • 出版年:2014
  • 出版时间:December 2014
  • 年:2014
  • 卷:2014
  • 期:1
  • 全文大小:804 KB
  • 参考文献:1. Khan, W, Aalsalem, M (2013) Detection and mitigation of node replication attacks in wireless sensor networks: a survey. Int. J. Distribute Sens. Netw 2013: pp. 1-22
    2. Zhang, DQ, Zhu, RB, Men, SQ, Raychoudhury, V (2013) Query representation with global consistency on user click graph. J. Internet Technol 14: pp. 759-769
    3. Parno, B, Perrig, A, Gligpr, V (2005) Distributed detection of node replication attacks sensor networks. Proceedings of IEEE Symposium on Security and Privacy (S & P). pp. 49-63
    4. Choi, H, Zhu, S, LA, TF (2007) SET Porta, Detecting node clones in sensor networks. Proceedings of the Third International Conference on Security and Privacy in Communication Networks. pp. 341-350
    5. Yu, CM, Lu, CS, Kuo, SY (2012) CSI: compressed sensing-based clone identification in sensor networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops. pp. 290-295
    6. Conti, M, Pietro, RD, Mancini, LV, Mei, A (2006) Requirements and open issues in distributed detection of node identity replicas in WSN. Proceedings of the 2006 IEEE International Conference on Systems (Man and Cybernetics SMC 2006). pp. 1473
    7. Xing, K, Cheng, X, Liu, F, Du, DH (2008) Real-time detection of clone attacks in wireless sensor networks. Paper presented at the 28th international conference on distributed computing systems.
    8. Znaidi, W, Minier, M, Ubeda, S (2009) Hierarchical node replication attacks detection in wireless sensors networks. Proceedings of the 20th IEEE international symposium on personal, indoor and mobile radio communications. PIMRC鈥?9, Tokyo Japan, pp. 82-86
    9. Zhang, M, Khanapure, V, Chen, S, Xiao, X (2009) Memory efficient protocols for detecting node replication attacks in wireless sensor networks. Proceedings of the 17th IEEE International Conference on Network Protocols ICNP 2009. pp. 284-293 CrossRef
    10. Zeng, K, Govindan, K, Mohapatra, P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wirel. Commun 17: pp. 56-62 CrossRef
    11. Conti, M, Di Pietro, R, Mancini, LV, Mei, A (2007) A randomized, efficient, distributed protocol for the detection of node replication attacks in wireless sensor network. Proceedings of the 8th ACM International Symposium on Mobile (Ad Hoc Networking and Computing MobiHoc 2007). pp. 80-89 CrossRef
    12. Zhu, B, Addada, VGK, Setia, S, Jajodia, S, Roy, S (2007) Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference ACSAC 2007. pp. 257-266
    13. Shu, WN, Cheng, L (2012) A novel load balancing optimization algorithm based on peer-to-peer technology in streaming media. J. Convergence Inform. Technol 7: pp. 189-196 CrossRef
    14. Brooks, R, Govindaraju, PY, Pirretti, M, Vijaykrishnan, N, Kandemir, MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev 37: pp. 1246-1258 CrossRef
    15. Zhu, B, Setia, S, Jajodia, S, Roy, S, Wang, L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans. Mob. Comput 9: pp. 913-926 CrossRef
    16. Ho, JW, Wright, M, Das, SK (2011) Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput 10: pp. 767-782 CrossRef
    17. Ho, JW, Wright, M, Das, SK (2009) Fast detection of replica node attacks in mobile sensor networks using sequential analysis. Proceedings of the IEEE INFOCOM. pp. 1773-1781
    18. Deng, XM, Xiong, Y (2011) A new protocol for the detection of node replication attacks in mobile wireless sensor networks. J. Comput. Sci. Technol 26: pp. 732-743 CrossRef
    19. Yu, CM, Lu, CS, Kuo, SY (2008) Mobile sensor network resilient against node replication attacks. Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor (Mesh and Ad Hoc Communications and Networks SECON 2008. pp. 597-599 CrossRef
    20. Wang, YJ, Yang, TY, Ma, YG, Halade, GV, Zhang, JQ, Lindsey, ML, Jin, YF (2012) Mathematical modeling and stability analysis of macrophage activation in left ventricular remodeling post-myocardial infarction. BMC Genomics 13: pp. 1-8 CrossRef
    21. Wang, LM, Shi, Y (2011) Patrol detection for replica attacks on wireless sensor networks. Sensors 11: pp. 2496-2504 CrossRef
    22. Lou, Y, Zhang, Y, Liu, S (2012) Single hop detection of node clone attacks in mobile wireless sensor networks. Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE). pp. 2798-2803
    23. Zhu, WT, Zhou, J, Deng, R, Bao, F (2012) Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw 5: pp. 496-507 CrossRef
    24. Zhu, RB, Qin, YY, Lai, CF (2011) Adaptive packet scheduling scheme to support real-time traffic in WLAN mesh networks. KSII Transac. Internet Inform. Syst 5: pp. 1492-1512
    25. Hess, F (2002) Efficient identity based signature schemes based on pairings. Proceedings of the Ninth Annual International Workshop on Selected Areas in Cryptography, SAC 2002. pp. 310-324
    26. Chan, H, Perrig, A, Song, D (2003) Random key predistribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy. pp. 197-213
    27. Heinzelman, WR, Chandrakasan, A (2000) Energy-efficient communication protocol for wireless microsensor networks. Paper presented at the 33rd Hawaii international conference on system sciences.
    28. Wang, YJ, Chen, P, Jin, YF (2009) Trajectory planning for an unmanned ground vehicle group using augmented particle swarm optimization in a dynamic environment. Proceedings of IEEE International Conference on Systems (Man and Cybernetics). pp. 4341-4346
  • 刊物主题:Signal, Image and Speech Processing;
  • 出版者:Springer International Publishing
  • ISSN:1687-1499
文摘
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication attacks. Our scheme distributes node location information to multiple randomly selected cells and then linear-multicasts the information for verification from the localized cells. Simulation results show that the proposed protocol improves detection efficiency compared with various existing protocols and prolongs the lifetime of the overall network.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700