Reporter node determination of replicated node detection in wireless sensor networks

Yuichi Sei, Shinichi Honiden

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Pages566-573
Number of pages8
DOIs
Publication statusPublished - 2009 Sep 21
Externally publishedYes
Event3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09 - Suwon
Duration: 2009 Jan 152009 Jan 16

Other

Other3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
CitySuwon
Period09/1/1509/1/16

Fingerprint

Sensor nodes
Wireless sensor networks
Sensor networks
Network protocols
Denial-of-service attack

Keywords

  • Algorithm
  • Node compromising attack
  • Node replication attack
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Sei, Y., & Honiden, S. (2009). Reporter node determination of replicated node detection in wireless sensor networks. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09 (pp. 566-573) https://doi.org/10.1145/1516241.1516340

Reporter node determination of replicated node detection in wireless sensor networks. / Sei, Yuichi; Honiden, Shinichi.

Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. p. 566-573.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sei, Y & Honiden, S 2009, Reporter node determination of replicated node detection in wireless sensor networks. in Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. pp. 566-573, 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09, Suwon, 09/1/15. https://doi.org/10.1145/1516241.1516340
Sei Y, Honiden S. Reporter node determination of replicated node detection in wireless sensor networks. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. p. 566-573 https://doi.org/10.1145/1516241.1516340
Sei, Yuichi ; Honiden, Shinichi. / Reporter node determination of replicated node detection in wireless sensor networks. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. pp. 566-573
@inproceedings{53ea24ad59da494c8dfc193bbd40688d,
title = "Reporter node determination of replicated node detection in wireless sensor networks",
abstract = "In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.",
keywords = "Algorithm, Node compromising attack, Node replication attack, Security, Wireless sensor networks",
author = "Yuichi Sei and Shinichi Honiden",
year = "2009",
month = "9",
day = "21",
doi = "10.1145/1516241.1516340",
language = "English",
isbn = "9781605584058",
pages = "566--573",
booktitle = "Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09",

}

TY - GEN

T1 - Reporter node determination of replicated node detection in wireless sensor networks

AU - Sei, Yuichi

AU - Honiden, Shinichi

PY - 2009/9/21

Y1 - 2009/9/21

N2 - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

AB - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

KW - Algorithm

KW - Node compromising attack

KW - Node replication attack

KW - Security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=70349103764&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349103764&partnerID=8YFLogxK

U2 - 10.1145/1516241.1516340

DO - 10.1145/1516241.1516340

M3 - Conference contribution

SN - 9781605584058

SP - 566

EP - 573

BT - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09

ER -