DocumentCode :
924752
Title :
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
Author :
Brooks, Richard ; Govindaraju, P.Y. ; Pirretti, Matthew ; Vijaykrishnan, N. ; Kandemir, Mahmut T.
Author_Institution :
Clemson Univ., Clemson
Volume :
37
Issue :
6
fYear :
2007
Firstpage :
1246
Lastpage :
1258
Abstract :
Random key predistribution security schemes are well suited for use in sensor networks due to their low overhead. However, the security of a network using predistributed keys can be compromised by cloning attacks. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. In this paper, we propose an algorithm that a sensor network can use to detect the presence of clones. Keys that are present on the cloned nodes are detected by looking at how often they are used to authenticate nodes in the network. Simulations verify that the proposed method accurately detects the presence of clones in the system and supports their removal. We quantify the extent of false positives and false negatives in the clone detection process.
Keywords :
cryptography; telecommunication security; wireless sensor networks; clones detection; clones removal; cloning attacks; network security schemes; random key predistribution; sensor networks; Cloning; Communication system security; Costs; Elliptic curve cryptography; Hardware; Monitoring; Operating systems; Peer to peer computing; Sensor systems; Wireless sensor networks; Clone detection; distributed systems; network security; sensor networks;
fLanguage :
English
Journal_Title :
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
Publisher :
ieee
ISSN :
1094-6977
Type :
jour
DOI :
10.1109/TSMCC.2007.905824
Filename :
4343983
Link To Document :
بازگشت