Real-time detection of clone attacks in wireless sensor networks

Kai Xing, Xiuzhen Cheng, Fang Liu, David H Du

Research output: Chapter in Book/Report/Conference proceedingConference contribution

122 Scopus citations

Abstract

A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead or a poor detection accuracy. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint. The fingerprint generation is based on the superimposed s-disjunct code, which incurs a very light communication and computation overhead. The fingerprint verification is conducted at both the base station and the neighboring sensors, which ensures a high detection probability. The security and performance analysis indicate that our algorithm can identify clone attacks with a high detection probability at the cost of a low computation/communication/storage overhead. To our best knowledge, our scheme is the first to provide realtime detection of clone attacks in an effective and efficient way.

Original languageEnglish (US)
Title of host publicationProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008
Pages3-10
Number of pages8
DOIs
StatePublished - 2008
Event28th International Conference on Distributed Computing Systems, ICDCS 2008 - Beijing, China
Duration: Jul 17 2008Jul 20 2008

Publication series

NameProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008

Other

Other28th International Conference on Distributed Computing Systems, ICDCS 2008
Country/TerritoryChina
CityBeijing
Period7/17/087/20/08

Fingerprint

Dive into the research topics of 'Real-time detection of clone attacks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this