Reporter node determination of replicated node detection in wireless sensor networks

Yuichi Sei, Shinichi Honiden

研究成果: Conference contribution

4 引用 (Scopus)

抄録

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

元の言語English
ホスト出版物のタイトルProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
ページ566-573
ページ数8
DOI
出版物ステータスPublished - 2009 9 21
外部発表Yes
イベント3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09 - Suwon
継続期間: 2009 1 152009 1 16

Other

Other3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Suwon
期間09/1/1509/1/16

Fingerprint

Sensor nodes
Wireless sensor networks
Sensor networks
Network protocols
Denial-of-service attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

これを引用

Sei, Y., & Honiden, S. (2009). Reporter node determination of replicated node detection in wireless sensor networks. : Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09 (pp. 566-573) https://doi.org/10.1145/1516241.1516340

Reporter node determination of replicated node detection in wireless sensor networks. / Sei, Yuichi; Honiden, Shinichi.

Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. p. 566-573.

研究成果: Conference contribution

Sei, Y & Honiden, S 2009, Reporter node determination of replicated node detection in wireless sensor networks. : Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. pp. 566-573, 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09, Suwon, 09/1/15. https://doi.org/10.1145/1516241.1516340
Sei Y, Honiden S. Reporter node determination of replicated node detection in wireless sensor networks. : Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. p. 566-573 https://doi.org/10.1145/1516241.1516340
Sei, Yuichi ; Honiden, Shinichi. / Reporter node determination of replicated node detection in wireless sensor networks. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09. 2009. pp. 566-573
@inproceedings{53ea24ad59da494c8dfc193bbd40688d,
title = "Reporter node determination of replicated node detection in wireless sensor networks",
abstract = "In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.",
keywords = "Algorithm, Node compromising attack, Node replication attack, Security, Wireless sensor networks",
author = "Yuichi Sei and Shinichi Honiden",
year = "2009",
month = "9",
day = "21",
doi = "10.1145/1516241.1516340",
language = "English",
isbn = "9781605584058",
pages = "566--573",
booktitle = "Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09",

}

TY - GEN

T1 - Reporter node determination of replicated node detection in wireless sensor networks

AU - Sei, Yuichi

AU - Honiden, Shinichi

PY - 2009/9/21

Y1 - 2009/9/21

N2 - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

AB - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

KW - Algorithm

KW - Node compromising attack

KW - Node replication attack

KW - Security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=70349103764&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349103764&partnerID=8YFLogxK

U2 - 10.1145/1516241.1516340

DO - 10.1145/1516241.1516340

M3 - Conference contribution

AN - SCOPUS:70349103764

SN - 9781605584058

SP - 566

EP - 573

BT - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09

ER -