On the detection of clones in sensor networks using random key predistribution

被引:78
作者
Brooks, Richard [1 ]
Govindaraju, P. Y.
Pirretti, Matthew
Vijaykrishnan, N.
Kandemir, Mahmut T.
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2007年 / 37卷 / 06期
关键词
clone detection; distributed systems; network security; sensor networks;
D O I
10.1109/TSMCC.2007.905824
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Random key predistribution security schemes are well suited for use in sensor networks due to their low overhead. However, the security of a network using predistributed keys can be compromised by cloning attacks. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. In this paper, we propose an algorithm that a sensor network can use to detect the presence of clones. Keys that are present on the cloned nodes are detected by looking at how often they are used to authenticate nodes in the network. Simulations verify that the proposed method accurately detects the presence of clones in the system and supports their removal. We quantity the extent of false positives and false negatives in the clone detection process.
引用
收藏
页码:1246 / 1258
页数:13
相关论文
共 22 条
[1]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[2]   Tracking multiple targets with self-organizing distributed ground sensors [J].
Brooks, R ;
Friedlander, D ;
Koch, J ;
Phoha, S .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2004, 64 (07) :874-884
[3]  
Brooks R.R., 1998, MULTISENSOR FUSION F
[4]  
BROOKS RR, 2005, DISRUPITVE SECURITY
[5]  
Brooks RR., 2005, DISTRIBUTED SENSOR N
[6]  
CARMAN DW, 2005, CHAP HALL CRC COMP I, P597
[7]  
CARMAN DW, 2000, 00010 NAI LAB
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[10]  
DIPIETRO R, 2004, P 2 ACM WORKSH SEC A, P53