Wireless sensor replica detection in mobile environments

Mauro Conti, Roberto Di Pietro, Angelo Spognardi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Wireless Sensor Networks (WSNs) pose a few unique security challenges due to the fact that they (often) run unattended, do not rely on tamper-resistant hardware, and are severely resource constrained-to name a few. In this context, a particularly dreadful attack is the replica attack. That is, sensors are captured and their state seized, and replicated in reprogrammed sensors eventually performing some rogue activities. While some solutions to this problem do exist in static WSNs, mobile WSNs lack of solutions that are both effective and efficient, due to the complexity added by sensor mobility. In this paper, we propose a novel solution against the replica attack in mobile WSNs. In particular, we provide the following contributions: we first introduce a novel realistic attacker model that can be used to assess the quality of the solutions provided. Later, we detail a distributed, efficient, and cooperative protocol to detect replica. Leveraging just local (one-hop) communications and node mobility our solution enforces the emergent property of replica detection. Finally, our solution is tested against the introduced attacker model. Simulation results show that our solution is effective and efficient-providing high detection rate while incurring limited overhead. © 2012 Springer-Verlag.
Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages249-264
Number of pages16
DOIs
StatePublished - Jan 17 2012
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2023-09-20

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Wireless sensor replica detection in mobile environments'. Together they form a unique fingerprint.

Cite this