TY - GEN
T1 - Reporter node determination of replicated node detection in wireless sensor networks
AU - Sei, Yuichi
AU - Honiden, Shinichi
PY - 2009
Y1 - 2009
N2 - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.
AB - In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate such code in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks and Sybil attacks. In the related studies, as a means of detecting compromised nodes, each node reports its neighbor's ID and location to a witness node with some probability p. The value of p is determined beforehand or from only the number of neighbor nodes. In this paper, we change p according to the locations of nodes. We aim to increase the detection rate of replicated node attacks and decrease the amount of messages. Our analysis and simulations demonstrate that using our protocol in combination with the methods of other studies is more effective than using the methods of the related studies by themselves.
KW - Algorithm
KW - Node compromising attack
KW - Node replication attack
KW - Security
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=70349103764&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349103764&partnerID=8YFLogxK
U2 - 10.1145/1516241.1516340
DO - 10.1145/1516241.1516340
M3 - Conference contribution
AN - SCOPUS:70349103764
SN - 9781605584058
T3 - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
SP - 566
EP - 573
BT - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
T2 - 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Y2 - 15 January 2009 through 16 January 2009
ER -