A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
Autor: | Luigi V. Mancini, Roberto Di Pietro, Alessandro Mei, Mauro Conti |
---|---|
Přispěvatelé: | Conti, M, DI PIETRO, Roberto, MANCINI L., V, Mei, A. |
Jazyk: | angličtina |
Rok vydání: | 2007 |
Předmět: |
Brooks–Iyengar algorithm
Computer science business.industry Distributed computing Node (networking) distributed protocol efficiency node replication attack detection resilience wireless sensor networks security Replication (computing) Key distribution in wireless sensor networks Mobile wireless sensor network business Wireless sensor network Protocol (object-oriented programming) Adversary model Computer network |
Zdroj: | MobiHoc |
Popis: | Wireless sensor networks are often deployed in hostile environments, where anadversary can physically capture some of the nodes. Once a node is captured, the attackercan re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol that is to be used in resource constrained environment such as a sensor network. Further, they are vulnerable to specific adversary models introduced in this paper.The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks and we show that it is completely satisfactory with respect to the requirements. Extensive simulations also show that our protocol is highly efficient in communication, memory, and computation, that it sets out an improved attack detection probability compared to the best solutions in the literature, and that it is resistant to the new kind of attacks we introduce in this paper, while other solutions are not. |
Databáze: | OpenAIRE |
Externí odkaz: |