Detecting node replication attacks in wireless sensor networks: A survey

被引:71
作者
Zhu, Wen Tao [1 ]
Zhou, Jianying [2 ]
Deng, Robert H. [3 ]
Bao, Feng [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[2] Inst Infocomm Res, Cryptog & Secur Dept, Singapore 138632, Singapore
[3] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Security; Node replication attack; Detection; DISTRIBUTED DETECTION; SECURITY; SCHEME; AUTHENTICATION; RESILIENT; PROTOCOLS; PRIVACY;
D O I
10.1016/j.jnca.2012.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1022 / 1034
页数:13
相关论文
共 55 条
[31]  
Newsome J, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P259
[32]   Distributed detection of node replication attacks in sensor networks [J].
Parno, B ;
Perrig, A ;
Gligor, V .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :49-63
[33]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[34]  
Poovendran R., 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
[35]  
Ruhrup S, 2009, AD HOC SENSOR WIRELE
[36]  
Sei Y, 2009, P 3 INT C UB INF MAN, P566
[37]  
Song H., 2007, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, P242, DOI DOI 10.1145/1280940.1280993
[38]   Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks [J].
Sun, Bo ;
Osborne, Lawrence ;
Xiao, Yang ;
Guizani, Sghaier .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :56-63
[39]  
Wen Tao Zhu, 2011, Proceedings of the 2011 International Conference on Network Computing and Information Security (NCIS), P156, DOI 10.1109/NCIS.2011.130
[40]   Anomaly detection in wireless sensor networks: A survey [J].
Xie, Miao ;
Han, Song ;
Tian, Biming ;
Parvin, Sazia .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1302-1325