Requirements and open issues in distributed detection of node identity replicas in WSN

被引:12
作者
Conti, Mauro [1 ]
Di Pietro, Roberto [2 ]
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat, Rome, Italy
[2] Univ Roma Tre, Dipartimento Matemat, Rome, Italy
来源
2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ICSMC.2006.384924
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSN) are often deployed in hostile environments, where an attacker can also capture some nodes. Once a node is captured, the attacker can re-program it and start replicating the node. These replicas can then be deployed in all (or a part of) the network area. The replicas can thus perform the attack they are programmed for: DoS (Denial of Service), or influencing any voting mechanism are just examples. Detection of node replication attack is therefore a fundamental property of all the WSN applications in which an attacker presence is possible. The contribution of this paper is twofold: First, we analyze the desirable properties of a distributed mechanism for the detection of replicated IDs; second, we show that the first proposal recently appeared in literature to realize a distributed solution for the detection of replicas does not completely fulfil the requirements. Hence, the design of efficient and distributed protocols to detect node identity replicas is still an open and demanding issue.
引用
收藏
页码:1468 / +
页数:2
相关论文
共 16 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
Bettstetter C., 2002, P 3 ACM INT S MOB AD, P80, DOI [10.1145/513800.513811, DOI 10.1145/513800.513811]
[3]  
Bettstetter C., 2003, P 6 ACM INT WORKSHOP, P28
[4]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[5]   Secure cooperative channel establishment in wireless sensor networks [J].
Conti, M ;
Di Pietro, R ;
Mancini, LV .
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, :327-+
[6]  
CONTI M, IN PRESS J AD HOC NE
[7]  
DEMIRBAS M, 2006, 1 WORKSH ADV EXPERIM, P564
[8]  
DIPIETRO R, 2004, P 2 ACM WORKSH SEC A, P53
[9]  
DIPIETRO R, 2006, IN PRESS WIRELESS NE
[10]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260