首页> 外文期刊>Selected Areas in Communications, IEEE Journal on >Random-walk based approach to detect clone attacks in wireless sensor networks
【24h】

Random-walk based approach to detect clone attacks in wireless sensor networks

机译:基于随机游动的方法来检测无线传感器网络中的克隆攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently, the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several drawbacks. First, some of them require a central control, which introduces several inherent limits. Second, some of them are deterministic and vulnerable to simple witness compromising attacks. Third, in some solutions the adversary can easily learn the critical witness nodes to start smart attacks and protect replicas from being detected. In this paper, we first show that in order to avoid existing drawbacks, replica-detection protocols must be non-deterministic and fully distributed (NDFD), and fulfill three security requirements on witness selection. To our knowledge, only one existing protocol, Randomized Multicast, is NDFD and fulfills the requirements, but it has very high communication overhead. Then, based on random walk, we propose two new NDFD protocols, RAndom WaLk (RAWL) and Table-assisted RAndom WaLk (TRAWL), which fulfill the requirements while having only moderate communication and memory overheads. The random walk strategy outperforms previous strategies because it distributes a core step, the witness selection, to every passed node of random walks, and then the adversary cannot easily find out the critical witness nodes. We theoretically analyze the required number of walk steps for ensuring detection. Our simulation results show that our protocols outperform an existing NDFD protocol with the lowest overheads in witness selection, and TRAWL even has lower memory overhead than that protocol. The communication overheads of our protocols are higher but are affordable considering their security benefits.
机译:部署在敌对环境中的无线传感器网络(WSN)容易受到克隆攻击。在这种攻击中,对手会破坏几个节点,对其进行复制,然后将任意数量的副本插入网络。因此,对手可以进行许多内部攻击。先前关于检测克隆攻击的解决方案有几个缺点。首先,其中一些需要中央控制,这会引入一些固有的限制。其次,它们中的一些是确定性的,并且容易受到简单的见证破坏攻击。第三,在某些解决方案中,对手可以轻松地学习关键的见证节点以发起智能攻击并保护副本不被检测到。在本文中,我们首先表明,为了避免存在现有缺陷,副本检测协议必须是不确定的且完全分布式的(NDFD),并且满足证人选择的三个安全要求。据我们所知,只有一个现有协议,即“随机多播”是NDFD,可以满足要求,但是它具有很高的通信开销。然后,基于随机游走,我们提出了两种新的NDFD协议:RAndom WaLk(RAWL)和表辅助RAndom WaLk(TRAWL),它们在满足这些要求的同时仅具有适度的通信和内存开销。随机游走策略的性能优于先前的策略,因为它向每个随机游走的传递节点分配了一个核心步骤,即证人选择,然后对手无法轻松地找到关键的证人节点。从理论上讲,我们分析了所需的步行步骤数以确保检测到。我们的仿真结果表明,我们的协议在见证人选择方面的开销要优于现有的NDFD协议,而TRAWL的内存开销甚至比该协议低。我们的协议的通信开销较高,但考虑到它们的安全性,负担得起。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号