Node capture attack detection and defence in wireless sensor networks
- 1 January 2012
- journal article
- Published by Institution of Engineering and Technology (IET) in IET Wireless Sensor Systems
- Vol. 2 (3), 161-169
- https://doi.org/10.1049/iet-wss.2011.0064
Abstract
Wireless sensor network (WSN) applications are often deployed under hostile environments. Monitoring sensor nodes carefully, detecting and providing defence against malicious activity in the region is a challenging task. Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets and cryptographic keys. This type of attack may result in a severe WSN security breach. Using ‘tamper-resistant’ nodes for securing communication in a WSN cannot be considered as a solution against these attacks as it increases the network cost tremendously. Nevertheless, destroying a legitimate node by erasing its memory and destroying its radio service based on a misjudgement may bring severe damage to the WSN. The authors propose the novel sensor node capture attack detection and defence (SCADD) protocol. SCADD provides a cost-effective solution against the node compromise and capture attacks in WSNs, enhancing the overall WSN security for security-sensitive applications. This protocol consists of two building blocks: node attack detection block and defence advocating measure block. The former provides strategic-based attack detection to eliminate the possibility of misjudgement and the latter uses a self-destruction defence measure against node capture attack, without actually destroying the node's radio service, to avoid a major security breach.Keywords
This publication has 24 references indexed in Scilit:
- Secure probabilistic location verification in randomly deployed wireless sensor networksAd Hoc Networks, 2008
- SecNavPublished by Association for Computing Machinery (ACM) ,2007
- Security in wireless sensor networksWireless Communications and Mobile Computing, 2006
- Securing sensor networks with location-based keysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Public Key Cryptography in Sensor Networks—RevisitedLecture Notes in Computer Science, 2005
- SeRLocPublished by Association for Computing Machinery (ACM) ,2004
- LiSPACM Transactions on Embedded Computing Systems, 2004
- Security and privacy in sensor networksComputer, 2003
- An authentication framework for hierarchical ad hoc sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Securing ad hoc networksIEEE Network, 1999