Abstract
Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant as the main attraction of deploying WSN is its low cost. Node replication attack exploits this weakness to launch an attack, in which cryptographic secrets from the compromised sensor nodes are used to create duplicate sensor nodes in large number. Then these sensor nodes are placed in critical locations of the WSN to mount attacks. Several protocols were proposed to defend WSN against the replication attack, and one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we modify the protocol to make it secure for dynamic WSN supporting node mobility.
Chapter PDF
Similar content being viewed by others
References
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. “A Survey on Sensor Networks”. IEEE Communications Magazine, 40(8):102-114, 2002.
J. Baek, E. Foo, H. C. Tan, and J. Zhou. “SecuringWireless Sensor Networks - Threats and Countermeasures”. Book Chapter in Security and Privacy in Wireless and Mobile Computing, Troubador Publishing, 2008.
M. Cagalj, S. Capkun, and J. P. Hubaux. “Wormhole-Based Antijamming Techniques in Sensor Networks”. IEEE Transactions on Mobile Computing, 6(1):100-114, 2007.
H. Chan, A. Perrig, and D. Song. “Secure Hierarchical In-Network Aggregation in Sensor Networks”. 2006 ACM Conference on Computer and Communications Security (CCS’06), pp. 278-287, 2006.
T. Cormen, C. Leiserson, R. Rivest, and C. Stein. “Introduction to Algorithms”. MIT Press, 2001.
D. Denning. “An Intrusion Detection Model”. IEEE Transactions on Software, Vol. SE-13, No. 2, pp. 222-232, 1987.
C. Hartung, J. Balasalle, and R. Han. “Node Compromise in Sensor Networks: The Need for Secure System”. Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder, 2004.
Y. C. Hu, A. Perrig, and D. B. Johnson. “Packet Leashes: A Defense againstWormhole Attacks in Wireless Networks”. 2003 IEEE INFOCOMM.
J. Lopez and J. Zhou (editors). “Wireless Sensor Network Security”. Cryptology & Information Security Series, Vol. 1, IOS Press, 2008.
J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter. “Detection of Denial-of-Message Attacks on Sensor Network Broadcasts”. 2005 IEEE Symposium on Security and Privacy (S&P’05), pp. 64-78, May 2005.
C. Karlof and D. Wagner. “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure”. AdHoc Networks, Vol. 1, Issues 2-3, pp. 293-315, Elsevier, September 2003.
B. Karp and H. T. Kung. “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”. 2000 ACM Annual International Conference on Mobile Computing and Networking (MobiCom’00), pp. 243-254, 2000.
J. Newsome, E. Shi, D. Song, and A. Perrig. “The Sybil Attack in Sensor Networks: Analysis & Defenses”. 2004 ACM International Symposium on Information Processing in Sensor Networks (IPSN’04), pp. 259-268, April 2004.
B. Parno, A. Perrig, and V. Gligor. “Distributed Detection of Node Replication Attacks in Sensor Networks”. 2005 IEEE Symposium on Security and Privacy (S&P’05), pp. 49-63, May 2005.
A. Perrig, J. Stankovic, and D. Wagner. “Security in Wireless Sensor Networks”. Communications of the ACM, 47(6):53-57, Special Issue on Wireless Sensor Networks, 2004.
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. “SPINS: Security Protocols for Sensor Networks”. Wireless Networks, Vol. 8, pp. 521-534, 2002.
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenkar. “GHT: A Geographic Hash Table for Data-Centric Storage”. 2002 ACM International Workshop on Wireless Sensor Networks and Applications (WSNA’02), September 2002.
D. Wood and J. A. Stankovic. “Denial of Service in Sensor Networks”. IEEE Computer, Vol.35, No. 10, 2002.
F. Ye, H. Luo, S. Lu, and L. Zhang. “Statistical En-route Filtering of Injected False Data in Sensor Networks”. IEEE Journal on Selected Areas in Communications, 23(4):839-850, April 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zhou, J., Das, T.K., Lopez, J. (2008). An Asynchronous Node Replication Attack in Wireless Sensor Networks. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)