DocumentCode :
2198247
Title :
Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme
Author :
Zhu, Wen Tao
Author_Institution :
State Key Lab. of Inf. Security Grad., Univ. of Chinese Acad. of Sci., Beijing, China
Volume :
2
fYear :
2011
fDate :
14-15 May 2011
Firstpage :
156
Lastpage :
160
Abstract :
We consider the node replication attack, which is an application-independent attack unique to wireless sensor networks. The attack makes it possible for an adversary to prepare her own low-cost sensor nodes and induce the network to accept them as legitimate ones. To do so, the adversary only needs to physically capture one node, reveal its secret credentials, replicate the node in large quantity, and deploy these malicious nodes back into the network so as to subvert the network with little effort. Recently, Ko et al. proposed a neighbor-based detection scheme to cope with replication attacks. The scheme features distributed detection and takes node mobility into account. It harnesses the dynamic observations of the neighbors of a claimer node and avoids the protocol iterations typically found in distributed detections. Unfortunately, we show that their proposal is subject to various replication attacks that can circumvent the detection. Moreover, it is even possible for a sophisticated adversary to exploit the protocol to revoke legitimate nodes.
Keywords :
protocols; telecommunication security; wireless sensor networks; application-independent attack; low-cost sensor nodes; neighbor-based detection scheme; node mobility; node replication attacks; protocol iterations; wireless sensor networks; Ad hoc networks; Base stations; Protocols; Radiation detectors; Routing; Security; Wireless sensor networks; Wireless sensor network; circumvention; neighbor-based detection; node replication attack; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-61284-347-6
Type :
conf
DOI :
10.1109/NCIS.2011.130
Filename :
5948813
Link To Document :
بازگشت