DocumentCode
2198247
Title
Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme
Author
Zhu, Wen Tao
Author_Institution
State Key Lab. of Inf. Security Grad., Univ. of Chinese Acad. of Sci., Beijing, China
Volume
2
fYear
2011
fDate
14-15 May 2011
Firstpage
156
Lastpage
160
Abstract
We consider the node replication attack, which is an application-independent attack unique to wireless sensor networks. The attack makes it possible for an adversary to prepare her own low-cost sensor nodes and induce the network to accept them as legitimate ones. To do so, the adversary only needs to physically capture one node, reveal its secret credentials, replicate the node in large quantity, and deploy these malicious nodes back into the network so as to subvert the network with little effort. Recently, Ko et al. proposed a neighbor-based detection scheme to cope with replication attacks. The scheme features distributed detection and takes node mobility into account. It harnesses the dynamic observations of the neighbors of a claimer node and avoids the protocol iterations typically found in distributed detections. Unfortunately, we show that their proposal is subject to various replication attacks that can circumvent the detection. Moreover, it is even possible for a sophisticated adversary to exploit the protocol to revoke legitimate nodes.
Keywords
protocols; telecommunication security; wireless sensor networks; application-independent attack; low-cost sensor nodes; neighbor-based detection scheme; node mobility; node replication attacks; protocol iterations; wireless sensor networks; Ad hoc networks; Base stations; Protocols; Radiation detectors; Routing; Security; Wireless sensor networks; Wireless sensor network; circumvention; neighbor-based detection; node replication attack; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location
Guilin
Print_ISBN
978-1-61284-347-6
Type
conf
DOI
10.1109/NCIS.2011.130
Filename
5948813
Link To Document