Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/18162
Title: Random-walk based approach to detect clone attacks in wireless sensor networks
Authors: Zeng, Y
Cao, J 
Zhang, S
Guo, S
Xie, L
Keywords: Clone attacks
Computer network security
Node replication
Random walk
Wireless sensor networks
Issue Date: 2010
Source: IEEE Journal on selected areas in communications, 2010, v. 28, no. 5, 5472424, p. 677-691 How to cite?
Journal: IEEE Journal on Selected Areas in Communications 
Abstract: Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently, the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several drawbacks. First, some of them require a central control, which introduces several inherent limits. Second, some of them are deterministic and vulnerable to simple witness compromising attacks. Third, in some solutions the adversary can easily learn the critical witness nodes to start smart attacks and protect replicas from being detected. In this paper, we first show that in order to avoid existing drawbacks, replica-detection protocols must be non-deterministic and fully distributed (NDFD), and fulfill three security requirements on witness selection. To our knowledge, only one existing protocol, Randomized Multicast, is NDFD and fulfills the requirements, but it has very high communication overhead. Then, based on random walk, we propose two new NDFD protocols, RAndom WaLk (RAWL) and Table-assisted RAndom WaLk (TRAWL), which fulfill the requirements while having only moderate communication and memory overheads. The random walk strategy outperforms previous strategies because it distributes a core step, the witness selection, to every passed node of random walks, and then the adversary cannot easily find out the critical witness nodes. We theoretically analyze the required number of walk steps for ensuring detection. Our simulation results show that our protocols outperform an existing NDFD protocol with the lowest overheads in witness selection, and TRAWL even has lower memory overhead than that protocol. The communication overheads of our protocols are higher but are affordable considering their security benefits.
URI: http://hdl.handle.net/10397/18162
ISSN: 0733-8716
DOI: 10.1109/JSAC.2010.100606
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

68
Last Week
0
Last month
1
Citations as of Sep 24, 2017

WEB OF SCIENCETM
Citations

37
Last Week
0
Last month
1
Citations as of Sep 24, 2017

Page view(s)

53
Last Week
2
Last month
Checked on Sep 25, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.