Distributed detection of node replication attacks in sensor networks

被引:284
作者
Parno, B [1 ]
Perrig, A [1 ]
Gligor, V [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2005年
关键词
D O I
10.1109/SP.2005.8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Previous node replication detection schemes depend primarily on centralized mechanisms with single points of failure, or on neighborhood voting protocols that fail to detect distributed replications. To address these fundamental limitations' we propose two new algorithms based on emergent properties [17], i.e., properties that arise only through the collective action of multiple nodes. Randomized Multicast distributes node location information to randomly-selected witnesses, exploiting the birthday paradox to detect replicated nodes, while Line-Selected Multicast uses the topology of the network to detect replication. Both algorithms provide globally-aware, distributed node-replica detection, and Line-Selected Multicast displays particularly strong performance characteristics. We show that emergent algorithms represent a promising new approach to sensor network security; moreover, our results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 35 条
[1]  
[Anonymous], 1978, Geometric probability
[2]  
[Anonymous], P IEEE S SEC PRIV MA
[3]  
[Anonymous], P ACM C COMP COMM SE
[4]  
BARGINSKY D, 2002, P ACM WORKSH WIR SEN
[5]  
BAWA M, 2003, ESTIMATING AGGREGRAT
[6]  
BLUNDO C, 1995, ADV CRYPTOLOGY EUROC
[7]  
BLUNDO C, 1996, ADV CRYPTOLOGY CRYTP
[8]  
Bulusu N., 2000, IEEE PERSONAL CO OCT
[9]  
Chan H., 2003, P IEEE S SEC PRIV MA
[10]  
Cormen T. H., 2001, Introduction to Algorithms, V2nd, DOI DOI 10.1145/963770.963776