Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

Yuichi Sei, Shinichi Honiden

Research output: Contribution to conferencePaper

9 Citations (Scopus)

Abstract

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.

Original languageEnglish
DOIs
Publication statusPublished - 2008 Jan 1
Externally publishedYes
Event4th Annual International Conference on Wireless Internet, WICON 2008 - Maui, United States
Duration: 2008 Nov 172008 Nov 19

Conference

Conference4th Annual International Conference on Wireless Internet, WICON 2008
CountryUnited States
CityMaui
Period08/11/1708/11/19

Fingerprint

Sensor nodes
Wireless sensor networks
Network protocols
Sensor networks
Denial-of-service attack

Keywords

  • Algorithm
  • Node compromising attack
  • Node replication attack
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Paper presented at 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, United States. https://doi.org/10.4108/ICST.WICON2008.4796

Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. / Sei, Yuichi; Honiden, Shinichi.

2008. Paper presented at 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, United States.

Research output: Contribution to conferencePaper

Sei, Y & Honiden, S 2008, 'Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks', Paper presented at 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, United States, 08/11/17 - 08/11/19. https://doi.org/10.4108/ICST.WICON2008.4796
Sei Y, Honiden S. Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. 2008. Paper presented at 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, United States. https://doi.org/10.4108/ICST.WICON2008.4796
Sei, Yuichi ; Honiden, Shinichi. / Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Paper presented at 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, United States.
@conference{6bcd4c2c107a4c8e96c29bc2f2f090ea,
title = "Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks",
abstract = "In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.",
keywords = "Algorithm, Node compromising attack, Node replication attack, Security, Wireless sensor networks",
author = "Yuichi Sei and Shinichi Honiden",
year = "2008",
month = "1",
day = "1",
doi = "10.4108/ICST.WICON2008.4796",
language = "English",
note = "4th Annual International Conference on Wireless Internet, WICON 2008 ; Conference date: 17-11-2008 Through 19-11-2008",

}

TY - CONF

T1 - Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

AU - Sei, Yuichi

AU - Honiden, Shinichi

PY - 2008/1/1

Y1 - 2008/1/1

N2 - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.

AB - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.

KW - Algorithm

KW - Node compromising attack

KW - Node replication attack

KW - Security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=84899335165&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84899335165&partnerID=8YFLogxK

U2 - 10.4108/ICST.WICON2008.4796

DO - 10.4108/ICST.WICON2008.4796

M3 - Paper

AN - SCOPUS:84899335165

ER -