• DocumentCode
    2198247
  • Title

    Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme

  • Author

    Zhu, Wen Tao

  • Author_Institution
    State Key Lab. of Inf. Security Grad., Univ. of Chinese Acad. of Sci., Beijing, China
  • Volume
    2
  • fYear
    2011
  • fDate
    14-15 May 2011
  • Firstpage
    156
  • Lastpage
    160
  • Abstract
    We consider the node replication attack, which is an application-independent attack unique to wireless sensor networks. The attack makes it possible for an adversary to prepare her own low-cost sensor nodes and induce the network to accept them as legitimate ones. To do so, the adversary only needs to physically capture one node, reveal its secret credentials, replicate the node in large quantity, and deploy these malicious nodes back into the network so as to subvert the network with little effort. Recently, Ko et al. proposed a neighbor-based detection scheme to cope with replication attacks. The scheme features distributed detection and takes node mobility into account. It harnesses the dynamic observations of the neighbors of a claimer node and avoids the protocol iterations typically found in distributed detections. Unfortunately, we show that their proposal is subject to various replication attacks that can circumvent the detection. Moreover, it is even possible for a sophisticated adversary to exploit the protocol to revoke legitimate nodes.
  • Keywords
    protocols; telecommunication security; wireless sensor networks; application-independent attack; low-cost sensor nodes; neighbor-based detection scheme; node mobility; node replication attacks; protocol iterations; wireless sensor networks; Ad hoc networks; Base stations; Protocols; Radiation detectors; Routing; Security; Wireless sensor networks; Wireless sensor network; circumvention; neighbor-based detection; node replication attack; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Computing and Information Security (NCIS), 2011 International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    978-1-61284-347-6
  • Type

    conf

  • DOI
    10.1109/NCIS.2011.130
  • Filename
    5948813