TY - JOUR
T1 - Clone wars
T2 - Distributed detection of clone attacks in mobile WSNs
AU - Conti, M.
AU - Di Pietro, R.
AU - Spognardi, A.
N1 - Funding Information:
Roberto Di Pietro has been partially supported by a Chair of Excellence from University Carlos III, Madrid, Spain .
Funding Information:
Mauro Conti is supported by a Marie Curie Fellowship funded by the European Commission for the PRISM-CODE project (Privacy and Security for Mobile Cooperative Devices) under the agreement No. PCIG11-GA-2012-321980 . This work has been partially supported by the TENACE PRIN Project (No. 20103P34XC ) funded by the Italian Ministry of Education, University and Research .
PY - 2014/5
Y1 - 2014/5
N2 - Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we provide several contributions: first, we introduce two novel realistic adversary models, the vanishing and the persistent adversary, characterized by different compromising capability. We then propose two distributed, efficient, and cooperative protocols to detect replicas: History Information-exchange Protocol (HIP) and its optimized version (HOP). Both HIP and HOP leverage just local (one-hop) communications and node mobility, and differ for the amount of computation required. We study their behavior against the introduced types of attacker, considering two different mobility models and comparing our solutions against the state of the art. Both analysis and simulation results show that our solutions are effective and efficient, providing high detection rate, while incurring limited overhead.
AB - Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we provide several contributions: first, we introduce two novel realistic adversary models, the vanishing and the persistent adversary, characterized by different compromising capability. We then propose two distributed, efficient, and cooperative protocols to detect replicas: History Information-exchange Protocol (HIP) and its optimized version (HOP). Both HIP and HOP leverage just local (one-hop) communications and node mobility, and differ for the amount of computation required. We study their behavior against the introduced types of attacker, considering two different mobility models and comparing our solutions against the state of the art. Both analysis and simulation results show that our solutions are effective and efficient, providing high detection rate, while incurring limited overhead.
KW - Clone attack
KW - Clone detection
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=84891939593&partnerID=8YFLogxK
U2 - 10.1016/j.jcss.2013.06.017
DO - 10.1016/j.jcss.2013.06.017
M3 - Article
AN - SCOPUS:84891939593
SN - 0022-0000
VL - 80
SP - 654
EP - 669
JO - Journal of Computer and System Sciences
JF - Journal of Computer and System Sciences
IS - 3
ER -