Abstract

It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication attacks. Our scheme distributes node location information to multiple randomly selected cells and then linear-multicasts the information for verification from the localized cells. Simulation results show that the proposed protocol improves detection efficiency compared with various existing protocols and prolongs the lifetime of the overall network.

Highlights

  • Wireless sensor networks are known as one of the three high-tech industries in the new century due to their great promise and potential with their various applications, such as in military affairs, industrial production, and environmental monitoring

  • While located in the wireless sensor networks, the node produces its location claim and forwards it to several neighbors; one or more neighbors transfer this claim to a trusted third party, e.g., a base station, which is responsible for detecting conflicting location claims

  • In order to increase its robustness against a smart attack, we describe an extension of the global deterministic linear propagation verification protocol (GDL) scheme, called the randomized parallel multiple cells linear propagation (RMC) verification protocol

Read more

Summary

Introduction

Wireless sensor networks are known as one of the three high-tech industries in the new century due to their great promise and potential with their various applications, such as in military affairs, industrial production, and environmental monitoring. Brooks et al [14] proposed an algorithm that would detect the node replication attacks by utilizing a statistical model based on the occurrence number of keys used to authenticate the nodes in wireless sensor networks, but the method can only be applied successfully with certain random key pre-distribution schemes. Conti et al [6] proposed another centralized protocol, called the randomized, efficient, and distributed (RED) protocol In this protocol, the base station multicasts a random number to the global hash function in order to output the location of witness nodes in each round of detection. Zhu et al [15] presented a distributed approach, called the single deterministic cell (SDC) In their method, wireless sensor networks are divided into several cells, and the location claim of each node is mapped to a cell and broadcasted within the cell. The first algorithm is a token-based authentication scheme; the second algorithm is a statistics-based detection scheme for detecting replicas that cooperates with one another

The protocol framework
Analysis of the RMC scheme
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.