4th International ICST Conference on Wireless Internet

Research Article

Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

Download391 downloads
  • @INPROCEEDINGS{10.4108/ICST.WICON2008.4796,
        author={Yuichi Sei and Shinichi Honiden},
        title={Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks},
        proceedings={4th International ICST Conference on Wireless Internet},
        publisher={ICST},
        proceedings_a={WICON},
        year={2010},
        month={5},
        keywords={Security Algorithm Wireless sensor networks Node compromising attack Node replication attack},
        doi={10.4108/ICST.WICON2008.4796}
    }
    
  • Yuichi Sei
    Shinichi Honiden
    Year: 2010
    Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks
    WICON
    ICST
    DOI: 10.4108/ICST.WICON2008.4796
Yuichi Sei1,*, Shinichi Honiden2,1,*
  • 1: The University of Tokyo 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8654, Japan
  • 2: National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan
*Contact email: sei@nii.ac.jp, honiden@nii.ac.jp

Abstract

In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.