Distributed Clone Detection in Mobile Sensor Networks

Abu Sayed Chowdhury, Akshaye Dhawan

2017

Abstract

In this paper, we present a clone detection technique for mobile wireless sensor networks. Since sensor nodes can be compromised and cloned by an adversary, it is desirable to have a distributed clone detection algorithm wherein the nodes in the network themselves identify cloned nodes. Most approaches in the literature have a deterministic set of witness nodes that check for the presence of cloned nodes for a given ID based by receiving claim messages that show two or more nodes with the same ID in different locations. We present a new approach to distributed clone detection called Distributed Detection using Prefix Matching (DDPM). Our approach is designed to work in a mobile sensor network and is based on using a random number and a hash function of the claiming nodes ID to generate a key. We then match the prefix of this key to sensor node IDs in the network to determine a set of inspector nodes that will detect clones for a given round. We demonstrate a 7-10% improvement in the number of witness nodes as a measure of security while also reducing the communication overhead.

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). A survey on sensor networks. IEEE communications magazine, 40(8):102-114.
  2. Bonaci, T., Bushnell, L., and Poovendran, R. (2010). Node capture attacks in wireless sensor networks: a system theoretic approach. In 49th IEEE Conference on Decision and Control (CDC), pages 6765-6772. IEEE.
  3. Brooks, R., Govindaraju, P., Pirretti, M., Vijaykrishnan, N., and Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6):1246-1258.
  4. Choi, H., Zhu, S., and La Porta, T. F. (2007). Set: Detecting node clones in sensor networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pages 341-350. IEEE.
  5. Conti, M., Di Pietro, R., Mancini, L., and Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and secure computing, 8(5):685-698.
  6. Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 41-47. ACM.
  7. Ho, J. W., Wright, M., and Das, S. K. (2009). Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In INFOCOM 2009, IEEE, pages 1773-1781. IEEE.
  8. Johnson, D. B. and Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing, pages 153-181. Springer.
  9. Khan, W. Z., Aalsalem, M. Y., and Saad, N. (2015). Distributed clone detection in static wireless sensor networks: Random walk with network division. PLoS One, 10(5).
  10. Liu, A. and Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pages 245-256. IEEE.
  11. Malan, D. J., Welsh, M., and Smith, M. D. (2008). Implementing public-key infrastructure for sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(4):22.
  12. OpenSim (2016). Omnet++.
  13. Parno, B., Perrig, A., and Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In 2005 IEEE Symposium on Security and Privacy (S&P'05), pages 49-63. IEEE.
  14. Yi, J., Koo, J., and Cha, H. (2008). A localization technique for mobile sensor networks using archived anchor information. In 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 64-72. IEEE.
  15. Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2008). Mobile sensor network resilient against node replication attacks. In 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 597-599. IEEE.
  16. Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2009). Efficient and distributed detection of node replication attacks in mobile sensor networks. In Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th, pages 1-5. IEEE.
  17. Yu, C.-M., Tsou, Y.-T., Lu, C.-S., and Kuo, S.-Y. (2013). Localized algorithms for detection of node replication attacks in mobile sensor networks. IEEE transactions on information forensics and security, 8(5):754-768.
  18. Zhou, L., Ni, J., and Ravishankar, C. V. (2006). Supporting secure communication and data collection in mobile sensor networks. In INFOCOM.
  19. Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., and Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Computer Security Applications Conference, 2007. ACSAC 2007. TwentyThird Annual, pages 257-267. IEEE.
Download


Paper Citation


in Harvard Style

Sayed Chowdhury A. and Dhawan A. (2017). Distributed Clone Detection in Mobile Sensor Networks . In Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS, ISBN 978-989-758-211-0, pages 135-141. DOI: 10.5220/0006130701350141


in Bibtex Style

@conference{sensornets17,
author={Abu Sayed Chowdhury and Akshaye Dhawan},
title={Distributed Clone Detection in Mobile Sensor Networks},
booktitle={Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS,},
year={2017},
pages={135-141},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006130701350141},
isbn={978-989-758-211-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS,
TI - Distributed Clone Detection in Mobile Sensor Networks
SN - 978-989-758-211-0
AU - Sayed Chowdhury A.
AU - Dhawan A.
PY - 2017
SP - 135
EP - 141
DO - 10.5220/0006130701350141