One of the most vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node from the network as the first step for further different types of attacks. For example, the adversary can collect all the cryptographic material stored in the node. Also, the node can be reprogrammed and re-deployed in the network in order to perform malicious activities. To the best of our knowledge no distributed solution has been proposed to detect a node capture in a mobile wireless sensor network. In this paper we propose an efficient and distributed solution to this problem leveraging emergent properties of mobile wireless sensor networks. In particular, we introduce two solutions: SDD, that does not require explicit information exchange between the nodes during the local detection, and CCD, a more sophisticated protocol that uses local node cooperation in addition to mobility to greatly improve performance. We also introduce a benchmark to compare these solutions with. Experimental results demonstrate the feasibility of our proposal. For instance, while the benchmark requires about 9,000 seconds to detect node captures, CDD requires less than 2,000 seconds. These results support our intuition that node mobility, in conjunction with a limited amount of local cooperation, can be used to detect emergent global properties. Copyright 2008 ACM.

Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks / Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro. - STAMPA. - (2008), pp. 214-219. (Intervento presentato al convegno Proceedings of the First ACM Conference on Wireless Network Security tenutosi a Alexandria; United States nel 31 Mar-2 Apr 2008) [10.1145/1352533.1352568].

Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks

CONTI, MAURO;DI PIETRO, ROBERTO;MANCINI, Luigi Vincenzo;MEI, Alessandro
2008

Abstract

One of the most vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node from the network as the first step for further different types of attacks. For example, the adversary can collect all the cryptographic material stored in the node. Also, the node can be reprogrammed and re-deployed in the network in order to perform malicious activities. To the best of our knowledge no distributed solution has been proposed to detect a node capture in a mobile wireless sensor network. In this paper we propose an efficient and distributed solution to this problem leveraging emergent properties of mobile wireless sensor networks. In particular, we introduce two solutions: SDD, that does not require explicit information exchange between the nodes during the local detection, and CCD, a more sophisticated protocol that uses local node cooperation in addition to mobility to greatly improve performance. We also introduce a benchmark to compare these solutions with. Experimental results demonstrate the feasibility of our proposal. For instance, while the benchmark requires about 9,000 seconds to detect node captures, CDD requires less than 2,000 seconds. These results support our intuition that node mobility, in conjunction with a limited amount of local cooperation, can be used to detect emergent global properties. Copyright 2008 ACM.
2008
Proceedings of the First ACM Conference on Wireless Network Security
wireless sensor network security, efficiency, node revocation, resilience, distributed protocol, node capture attack detection, network properties
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks / Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro. - STAMPA. - (2008), pp. 214-219. (Intervento presentato al convegno Proceedings of the First ACM Conference on Wireless Network Security tenutosi a Alexandria; United States nel 31 Mar-2 Apr 2008) [10.1145/1352533.1352568].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/367704
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 90
  • ???jsp.display-item.citation.isi??? 50
social impact