Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network

  • Sarita Agrawal
  • Manik Lal Das
  • Anish Mathuria
  • Sanjay Srivastava
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9478)


Wireless Sensor Networks (WSNs) are used in various applications mostly in hostile and emergency environments e.g. battle field surveillance, monitoring of nuclear activities, etc. The unattended deployment of WSNs, unreliable wireless communication and inherent resource constraints necessitate addressing the security of the WSNs in an efficient and economical way. In this paper, a node program integrity verification protocol is proposed in which the cluster heads are equipped with Trusted Platform Module (TPM) and serve as the verifiers. The protocol aims to first ensure the authentication of the verifier by a node, thereby, only an authenticated verifier is allowed to verify the authenticity and the integrity of the program of a node within its cluster. The proposed protocol also ensures that capture of one node does not reveal the secret of any other node in the network to the adversary. In addition to this, the protocol is secured against node collusion, man-in-the-middle and impersonation attacks. Since, the proposed protocol considers TPMs only at the cluster heads, unlike fully TPM enabled WSN, the overall network deployment cost is reduced. The aim of the proposed protocol is to provide program integrity verification for detecting node capture attack in a WSN with reduced computational, communication and storage cost overhead compared to the existing protocols for program integrity verification. The performance analysis and the simulation results verify the performance improvement.


Wireless sensor network Node capture attack Trusted platform module Program integrity verification 


  1. 1.
    Menezes, A., van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefMATHGoogle Scholar
  2. 2.
    Benenson, Z., Cholewinski, P., Felix, C.: Wireless sensor network security. In: Vulnerabilities and Attacks in Wireless Sensor Networks, pp. 22–43. IOS Press, Amsterdam (2008)Google Scholar
  3. 3.
    Kim, J., Caytiles, R., Kim, K.: A review of the vulnerabilities and attacks for wireless sensor networks. J. Secur. Eng. 9(3), 241–250 (2012)Google Scholar
  4. 4.
    Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: real-world attacks on wireless sensor networks. In: Proceedings of 3rd International Conference on Security in Pervasive Computing, pp. 104–118 (2006)Google Scholar
  5. 5.
    Groups, T.C.: Trusted Platform Module (TPM) Summary (2009). Accessed 07 May 2015
  6. 6.
    Trusted computing group. Accessed 07 May 2015
  7. 7.
    Tomlinson, A.: Chapter: Introduction to TPM riptsize. Accessed 07 May 2015
  8. 8.
    Junior, W., Hao, T., Wong, C., Loureiro, A.: Malicious node detection in wireless sensor networks. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, vol. 4, pp. 24–30 (2004)Google Scholar
  9. 9.
    Mathews, M., Song, M., Shetty, S., McKenzie, R.: Detecting compromised nodes in wireless sensor networks. In: Proceedings of 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 1, pp. 273–278 (2007)Google Scholar
  10. 10.
    Conti, M., Pietro, R., Mancini, L., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of 1st ACM Conference on Wireless Network Security, pp. 214–219 (2008)Google Scholar
  11. 11.
    Conti, M., Pietro, R., Mancini, L., Mei, A.: Mobility and cooperation to thwart node capture attacks in MANETs. EURASIP J. Wirel. Commun. Netw., 2009(8) (2009)Google Scholar
  12. 12.
    Ding, W., Laha, B., Yenduri, S.: First stage detection of compromised nodes in sensor networks. In: Proceedings of Sensors Applications Symposium, pp. 20–24 (2009)Google Scholar
  13. 13.
    Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of 28th IEEE Conference on Global Telecommunications, pp. 1–6 (2009)Google Scholar
  14. 14.
    Park, T., Shin, K.: Soft-tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mob. Comput. 4(3), 297–309 (2005)CrossRefGoogle Scholar
  15. 15.
    Chang, K., Shin, K.: Distributed authentication of program integrity verification in wireless sensor networks. In: ACM Transactions on Information and Systems Security, vol. 11, No. 3, Article 14 (2008)Google Scholar
  16. 16.
    Seshadri, A., Perrig, A., Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for embedded devices. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 272–282 (2004)Google Scholar
  17. 17.
    Seshadri, A., Luk, M., Perrig, A., Doorn, L., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: Proceedings of ACM Workshop on Wireless Security (WiSe), pp. 85–94 (2006)Google Scholar
  18. 18.
    Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  19. 19.
    Tan, H., Hu, W., Jha, S.: A TPM-enabled remote attestation protocol(TRAP) in wireless sensor networks. In: Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pp. 9–16 (2011)Google Scholar
  20. 20.
  21. 21.
    Lee, J., Kapitanova, K., Son, S.: The price of security in wireless sensor networks. Comput. Netw. (Elsevier) 54, 2967–2978 (2010)CrossRefGoogle Scholar
  22. 22.
    Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.87beta6: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2013)Google Scholar
  23. 23.
    Boulis, A.: Castalia - A simulator for Wireless Sensor Networks and Body Area Networks - User’s Manual, Version 3.2 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Sarita Agrawal
    • 1
  • Manik Lal Das
    • 1
  • Anish Mathuria
    • 1
  • Sanjay Srivastava
    • 1
  1. 1.Dhirubhai Ambani Institute of Information and Communication TechnologyGandhinagarIndia

Personalised recommendations