Distributed Clone Detection in Mobile Sensor Networks
Abu Sayed Chowdhury, Akshaye Dhawan
2017
Abstract
In this paper, we present a clone detection technique for mobile wireless sensor networks. Since sensor nodes can be compromised and cloned by an adversary, it is desirable to have a distributed clone detection algorithm wherein the nodes in the network themselves identify cloned nodes. Most approaches in the literature have a deterministic set of witness nodes that check for the presence of cloned nodes for a given ID based by receiving claim messages that show two or more nodes with the same ID in different locations. We present a new approach to distributed clone detection called Distributed Detection using Prefix Matching (DDPM). Our approach is designed to work in a mobile sensor network and is based on using a random number and a hash function of the claiming nodes ID to generate a key. We then match the prefix of this key to sensor node IDs in the network to determine a set of inspector nodes that will detect clones for a given round. We demonstrate a 7-10% improvement in the number of witness nodes as a measure of security while also reducing the communication overhead.
References
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). A survey on sensor networks. IEEE communications magazine, 40(8):102-114.
- Bonaci, T., Bushnell, L., and Poovendran, R. (2010). Node capture attacks in wireless sensor networks: a system theoretic approach. In 49th IEEE Conference on Decision and Control (CDC), pages 6765-6772. IEEE.
- Brooks, R., Govindaraju, P., Pirretti, M., Vijaykrishnan, N., and Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6):1246-1258.
- Choi, H., Zhu, S., and La Porta, T. F. (2007). Set: Detecting node clones in sensor networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pages 341-350. IEEE.
- Conti, M., Di Pietro, R., Mancini, L., and Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and secure computing, 8(5):685-698.
- Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 41-47. ACM.
- Ho, J. W., Wright, M., and Das, S. K. (2009). Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In INFOCOM 2009, IEEE, pages 1773-1781. IEEE.
- Johnson, D. B. and Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing, pages 153-181. Springer.
- Khan, W. Z., Aalsalem, M. Y., and Saad, N. (2015). Distributed clone detection in static wireless sensor networks: Random walk with network division. PLoS One, 10(5).
- Liu, A. and Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pages 245-256. IEEE.
- Malan, D. J., Welsh, M., and Smith, M. D. (2008). Implementing public-key infrastructure for sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(4):22.
- OpenSim (2016). Omnet++.
- Parno, B., Perrig, A., and Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In 2005 IEEE Symposium on Security and Privacy (S&P'05), pages 49-63. IEEE.
- Yi, J., Koo, J., and Cha, H. (2008). A localization technique for mobile sensor networks using archived anchor information. In 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 64-72. IEEE.
- Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2008). Mobile sensor network resilient against node replication attacks. In 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 597-599. IEEE.
- Yu, C.-M., Lu, C.-S., and Kuo, S.-Y. (2009). Efficient and distributed detection of node replication attacks in mobile sensor networks. In Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th, pages 1-5. IEEE.
- Yu, C.-M., Tsou, Y.-T., Lu, C.-S., and Kuo, S.-Y. (2013). Localized algorithms for detection of node replication attacks in mobile sensor networks. IEEE transactions on information forensics and security, 8(5):754-768.
- Zhou, L., Ni, J., and Ravishankar, C. V. (2006). Supporting secure communication and data collection in mobile sensor networks. In INFOCOM.
- Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., and Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Computer Security Applications Conference, 2007. ACSAC 2007. TwentyThird Annual, pages 257-267. IEEE.
Paper Citation
in Harvard Style
Sayed Chowdhury A. and Dhawan A. (2017). Distributed Clone Detection in Mobile Sensor Networks . In Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS, ISBN 978-989-758-211-0, pages 135-141. DOI: 10.5220/0006130701350141
in Bibtex Style
@conference{sensornets17,
author={Abu Sayed Chowdhury and Akshaye Dhawan},
title={Distributed Clone Detection in Mobile Sensor Networks},
booktitle={Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS,},
year={2017},
pages={135-141},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006130701350141},
isbn={978-989-758-211-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 6th International Conference on Sensor Networks - Volume 1: SENSORNETS,
TI - Distributed Clone Detection in Mobile Sensor Networks
SN - 978-989-758-211-0
AU - Sayed Chowdhury A.
AU - Dhawan A.
PY - 2017
SP - 135
EP - 141
DO - 10.5220/0006130701350141