Detecting node replication attacks in wireless sensor networks: A survey

被引:71
作者
Zhu, Wen Tao [1 ]
Zhou, Jianying [2 ]
Deng, Robert H. [3 ]
Bao, Feng [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[2] Inst Infocomm Res, Cryptog & Secur Dept, Singapore 138632, Singapore
[3] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Security; Node replication attack; Detection; DISTRIBUTED DETECTION; SECURITY; SCHEME; AUTHENTICATION; RESILIENT; PROTOCOLS; PRIVACY;
D O I
10.1016/j.jnca.2012.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1022 / 1034
页数:13
相关论文
共 55 条
[1]  
Bekara C, 2007, IEEE CONF WIREL MOB
[2]   Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach [J].
Bonaci, Tamara ;
Bushnell, Linda ;
Poovendran, Radha .
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, :6765-6772
[3]   Localization systems for wireless sensor networks [J].
Boukerche, Azzedine ;
Oliveira, Horacio A. B. F. ;
Nakamura, Eduardo F. ;
Loureiro, Antonio A. F. .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (06) :6-12
[4]   On the detection of clones in sensor networks using random key predistribution [J].
Brooks, Richard ;
Govindaraju, P. Y. ;
Pirretti, Matthew ;
Vijaykrishnan, N. ;
Kandemir, Mahmut T. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1246-1258
[5]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[6]  
Chia-Mu Yu, 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, P597, DOI 10.1109/SAHCN.2008.82
[7]   SET: Detecting node clones in sensor networks [J].
Choi, Heesook ;
Zhu, Sencun ;
La Porta, Thomas F. .
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, :341-350
[8]   Distributed Detection of Clone Attacks in Wireless Sensor Networks [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi Vincenzo ;
Mei, Alessandro .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :685-698
[9]   Mobility and Cooperation to Thwart Node Capture Attacks in MANETs [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Mei, Alessandro .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
[10]   Requirements and open issues in distributed detection of node identity replicas in WSN [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Mei, Alessandro .
2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, :1468-+