TY - GEN
T1 - A new protocol for securing wireless sensor networks against nodes replication attacks
AU - Bekara, Chakib
AU - Laurent-Maknavicius, Maryline
PY - 2007/12/1
Y1 - 2007/12/1
N2 - The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshielded nature of sensors, their deployment in remote open (hostile) areas, and the use of wireless transmission medium, make them subject to several kind of threats and attacks, like eavesdropping, intrusion, Deny of Services (DoS) attacks and nodes compromising. While most of threats and attacks can be prevented using cryptographic materials (i.e. shared pairwise secret keys, certificates, etc.) provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are harmful attacks, where an attacker compromising a node, uses its secret cryptographic key materials to successfully populate the network with several clones of it, in-order to gain the control over the network or disturb the normal operation of the network. Several nodes replication detection protocols were proposed in the literature, but unfortunately, they require either a high computation, transmission and energy overheads, or that nodes know their exact locations coordinates, which limits their usability in most WSN scenarios. In this paper, we present a new protocol for securing and preventing against nodes replication attacks in static WSN, which requires no knowledge of nodes deployment locations, and introduces no significant overhead on the resourceconstrained sensors.
AB - The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshielded nature of sensors, their deployment in remote open (hostile) areas, and the use of wireless transmission medium, make them subject to several kind of threats and attacks, like eavesdropping, intrusion, Deny of Services (DoS) attacks and nodes compromising. While most of threats and attacks can be prevented using cryptographic materials (i.e. shared pairwise secret keys, certificates, etc.) provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are harmful attacks, where an attacker compromising a node, uses its secret cryptographic key materials to successfully populate the network with several clones of it, in-order to gain the control over the network or disturb the normal operation of the network. Several nodes replication detection protocols were proposed in the literature, but unfortunately, they require either a high computation, transmission and energy overheads, or that nodes know their exact locations coordinates, which limits their usability in most WSN scenarios. In this paper, we present a new protocol for securing and preventing against nodes replication attacks in static WSN, which requires no knowledge of nodes deployment locations, and introduces no significant overhead on the resourceconstrained sensors.
KW - Key management protocols
KW - Nodes replication attacks
KW - Pubic key cryptography
KW - WSN security
U2 - 10.1109/WIMOB.2007.4390853
DO - 10.1109/WIMOB.2007.4390853
M3 - Conference contribution
AN - SCOPUS:47049125806
SN - 0769528899
SN - 9780769528892
T3 - 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007
BT - 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007
T2 - 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007
Y2 - 8 October 2007 through 10 October 2007
ER -