Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Time synchronization in ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
iTPS: an improved location discovery scheme for sensor networks with long-range beacons
Journal of Parallel and Distributed Computing
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks
ICPPW '06 Proceedings of the 2006 International Conference Workshops on Parallel Processing
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Localization in mobile ad hoc networks using cumulative route information
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
TPSS: a time-based positioning scheme for sensor networks with short range beacons
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Hi-index | 0.00 |
A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wireless devices are often not protected by tamper-resistant hardware due to small form factors and low cost, and can be easily stolen/lost or temporarily controlled by unauthorized entities due to their harsh working environments. A serious consequence of the device capture attack is the node replication attacks in which adversaries deploy a large number of replicas of the compromised/captured nodes throughout the network. Replicated nodes have all legitimate security credentials and therefore can launch various insider attacks, or even take over the network easily. They are indeed "attack multipliers" and therefore are extremely destructive to the network. Detecting replication attacks is a nontrivial problem in MANETs due to the challenges resulted from node mobility, cloned/compromised node collusion, and the large number and wide spread of the replicas. Existing approaches either fail in mobile environments due to the limitations caused by local views or their dependence on invariant claims such as location and neighbor list, or are constrained by the number, distribution, and colluding activities of the replicas. In this paper, we propose two replication detection schemes (TDD and SDD) to tackle all these challenges from both the time domain and the space domain. Our theoretical analysis indicates that TDD and SDD provide high detection accuracy and excellent resilience against smart and colluding replicas, have no restriction on the number and distribution of replicas, and incur low communication/computation overhead. To our best knowledge, TDD and SDD are the only approaches that support mobile networks while place no restrictions on the number and distribution of the cloned frauds and on whether the replicas collude or not.