CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks
- 1 November 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Node compromise attack is a serious threat to the successful deployment of wireless sensor networks. It is a multiple-stage attack, which usually consists of three stages: physically capturing and compromising sensor nodes; redeploying the compromised nodes back to the sensor network; and compromised sensor nodes rejoining the network and launching attack. Over the last few years, much previous work has tackled the node compromise attack in the late stage, either in the second stage or in the third stage. As a result, the protection measures are often ineffective. In this paper, we will make the first effort on addressing the node compromise problem in the first stage, and present a new couple-based scheme to detect the node compromise attack in early stage. Specifically, after sensor nodes are deployed, they first build couples in ad hoc pattern. Then, the nodes within the same couple can monitor each other to detect any node compromise attempt. Extensive simulation results are given to demonstrate the high detection rate of the proposed scheme.Keywords
This publication has 13 references indexed in Scilit:
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Distributed Software-based Attestation for Node Compromise Detection in Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Sensor node compromise detectionPublished by Association for Computing Machinery (ACM) ,2007
- Security in wireless sensor networksWireless Communications and Mobile Computing, 2006
- An effective key management scheme for heterogeneous sensor networksAd Hoc Networks, 2006
- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)Lecture Notes in Computer Science, 2006
- PioneerPublished by Association for Computing Machinery (ACM) ,2005
- Detection and handling of MAC layer misbehavior in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Establishing pairwise keys in distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Reflection as a mechanism for software integrity verificationACM Transactions on Information and System Security, 2000