Reporter node determination of replicated node detection in wireless sensor networks

Yuichi Sei*, Shinichi Honiden

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Pages566-573
Number of pages8
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09 - Suwon, Korea, Republic of
Duration: 2009 Jan 152009 Jan 16

Publication series

NameProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09

Conference

Conference3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Country/TerritoryKorea, Republic of
CitySuwon
Period09/1/1509/1/16

Keywords

  • Algorithm
  • Node compromising attack
  • Node replication attack
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Reporter node determination of replicated node detection in wireless sensor networks'. Together they form a unique fingerprint.

Cite this