Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification

IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Internet of Things Pub Date : 2024-07-18 DOI:10.1016/j.iot.2024.101289
{"title":"Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification","authors":"","doi":"10.1016/j.iot.2024.101289","DOIUrl":null,"url":null,"abstract":"<div><p>Since sensor networks are deployed in harsh and unattended environments, and the nodes are not tamper-resistant, security is crucial for all the impending sensor network applications. When physically compromised, confidential credential of sensor nodes may be revealed to adversaries. Upon obtaining the credentials, an adversary can produce a number of replicas of a compromised legitimate node. These replicas interfere with or prevent the normal operation of the network through attacks called <span><math><mrow><mi>r</mi><mi>e</mi><mi>p</mi><mi>l</mi><mi>i</mi><mi>c</mi><mi>a</mi></mrow></math></span> or <span><math><mrow><mi>i</mi><mi>m</mi><mi>p</mi><mi>o</mi><mi>s</mi><mi>t</mi><mi>e</mi><mi>r</mi></mrow></math></span> <span><math><mrow><mi>a</mi><mi>t</mi><mi>t</mi><mi>a</mi><mi>c</mi><mi>k</mi><mi>s</mi></mrow></math></span>. Hence detection, identification and quarantining of replicas attacks are crucial. Existing schemes mostly focus on static sensor networks while solutions for MWSN’s are also available. Upon discovering that an id is used by multiple nodes, these schemes quarantine all nodes with the same id without distinguishing the legitimate node from its replicas. In this paper, we propose a novel distributed light-weight and memory efficient signature-based protocol for quarantining malicious replicas in the presence of Byzantine replicas in MWSN’s. This protocol quarantines only the replicas that present wrong sensed data in the presence of Byzantine replicas that modify and communicate its data and send false claims. The proposed protocol uses a signature generation, exchange and verification scheme to detect, uniquely identify and distinguish replicas with the same id among multiple replicas for a single legitimate node. The protocol quarantines only the malicious replicas that present wrong sensed data among all the detected replicas of each legitimate node by uniquely identifying the malicious replicas using their unique signatures.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524002300","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Since sensor networks are deployed in harsh and unattended environments, and the nodes are not tamper-resistant, security is crucial for all the impending sensor network applications. When physically compromised, confidential credential of sensor nodes may be revealed to adversaries. Upon obtaining the credentials, an adversary can produce a number of replicas of a compromised legitimate node. These replicas interfere with or prevent the normal operation of the network through attacks called replica or imposter attacks. Hence detection, identification and quarantining of replicas attacks are crucial. Existing schemes mostly focus on static sensor networks while solutions for MWSN’s are also available. Upon discovering that an id is used by multiple nodes, these schemes quarantine all nodes with the same id without distinguishing the legitimate node from its replicas. In this paper, we propose a novel distributed light-weight and memory efficient signature-based protocol for quarantining malicious replicas in the presence of Byzantine replicas in MWSN’s. This protocol quarantines only the replicas that present wrong sensed data in the presence of Byzantine replicas that modify and communicate its data and send false claims. The proposed protocol uses a signature generation, exchange and verification scheme to detect, uniquely identify and distinguish replicas with the same id among multiple replicas for a single legitimate node. The protocol quarantines only the malicious replicas that present wrong sensed data among all the detected replicas of each legitimate node by uniquely identifying the malicious replicas using their unique signatures.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用复制检测和识别技术的移动无线传感器网络恶意复制隔离协议
由于传感器网络部署在恶劣和无人值守的环境中,而且节点不具备防篡改能力,因此安全性对所有即将到来的传感器网络应用都至关重要。当物理受损时,传感器节点的机密凭证可能会泄露给对手。在获得凭据后,敌方可以制造出许多被破坏的合法节点的复制品。这些复制品会通过被称为复制品或冒名顶替者攻击的方式干扰或阻止网络的正常运行。因此,检测、识别和隔离复制攻击至关重要。现有方案大多侧重于静态传感器网络,但也有针对 MWSN 的解决方案。一旦发现一个 ID 被多个节点使用,这些方案就会隔离具有相同 ID 的所有节点,而不会区分合法节点和复制节点。在本文中,我们提出了一种新颖的基于签名的分布式轻量级内存高效协议,用于在 MWSN 中存在拜占庭复制的情况下隔离恶意复制。在拜占庭复制修改和传播其数据并发送虚假请求的情况下,该协议只对提供错误感知数据的复制进行隔离。建议的协议使用签名生成、交换和验证方案来检测、唯一识别和区分单个合法节点多个副本中具有相同 ID 的副本。该协议通过使用独特的签名唯一识别恶意副本,在每个合法节点的所有检测到的副本中,只隔离提供错误感知数据的恶意副本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Internet of Things
Internet of Things Multiple-
CiteScore
3.60
自引率
5.10%
发文量
115
审稿时长
37 days
期刊介绍: Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. The journal will place a high priority on timely publication, and provide a home for high quality. Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.
期刊最新文献
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment Environmental noise monitoring using distributed hierarchical wireless acoustic sensor network Quantifying impact: Bibliometric examination of IoT's evolution in sustainable development An IoT-based contactless neonatal respiratory monitoring system for neonatal care assistance in postpartum center
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1