DocumentCode :
1285825
Title :
Distributed Detection of Clone Attacks in Wireless Sensor Networks
Author :
Conti, Mauro ; Pietro, Roberto Di ; Mancini, Luigi V. ; Mei, Alessandro
Author_Institution :
Dipt. di lnformatica, Univ. of Rome La Sapienza, Rome, Italy
Volume :
8
Issue :
5
fYear :
2011
Firstpage :
685
Lastpage :
698
Abstract :
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol to be used in the WSN-resource-constrained environment. Further, they are vulnerable to the specific adversary models introduced in this paper. The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new self-healing, Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks, and we show that it satisfies the introduced requirements. Finally, extensive simulations show that our protocol is highly efficient in communication, memory, and computation; is much more effective than competing solutions in the literature; and is resistant to the new kind of attacks introduced in this paper, while other solutions are not.
Keywords :
protocols; telecommunication security; wireless sensor networks; WSN-resource-constrained environment; clone attacks distributed detection; node replication attack detection; randomized efficient and distributed protocol; wireless sensor networks; Aggregates; Cloning; Collaboration; Computational modeling; Costs; Cryptography; Mechanical factors; Protocols; Resilience; Wireless sensor networks; Wireless sensor networks security; distributed protocol; efficiency.; node replication attack detection; resilience;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2010.25
Filename :
5539762
Link To Document :
بازگشت