Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

On the Detection of Clones in Sensor Networks Using Random Key Predistribution

Published: 01 November 2007 Publication History

Abstract

Random key predistribution security schemes are well suited for use in sensor networks due to their low overhead. However, the security of a network using predistributed keys can be compromised by cloning attacks. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. In this paper, we propose an algorithm that a sensor network can use to detect the presence of clones. Keys that are present on the cloned nodes are detected by looking at how often they are used to authenticate nodes in the network. Simulations verify that the proposed method accurately detects the presence of clones in the system and supports their removal. We quantify the extent of false positives and false negatives in the clone detection process.

Cited By

View all
  1. On the Detection of Clones in Sensor Networks Using Random Key Predistribution

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
      IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews  Volume 37, Issue 6
      November 2007
      332 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 November 2007

      Author Tags

      1. Clone detection
      2. distributed systems
      3. network security
      4. sensor networks

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A survey on indoor positioning security and privacyComputers and Security10.1016/j.cose.2023.103293131:COnline publication date: 1-Aug-2023
      • (2023)An Optimized Clone Node Detection in WSN Using Cuckoo FilterSN Computer Science10.1007/s42979-022-01586-z4:2Online publication date: 16-Jan-2023
      • (2022)A context-aware information-based clone node attack detection scheme in Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2021.103271197:COnline publication date: 1-Jan-2022
      • (2022)Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of thingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108702204:COnline publication date: 26-Feb-2022
      • (2021)An Efficient Three-Phase Fuzzy Logic Clone Node Detection ModelSecurity and Communication Networks10.1155/2021/99244782021Online publication date: 1-Jan-2021
      • (2020)Security of the Internet of Things: Vulnerabilities, Attacks, and CountermeasuresIEEE Communications Surveys & Tutorials10.1109/COMST.2019.295336422:1(616-644)Online publication date: 9-Mar-2020
      • (2019)Design and implementation of an efficient attack resilient computation algorithm in WSN nodesCluster Computing10.1007/s10586-018-2147-622:2(3301-3311)Online publication date: 1-Mar-2019
      • (2018)Distributed Location and Trust Based Replica Detection in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5369-2102:4(3303-3321)Online publication date: 1-Oct-2018
      • (2018)Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient OperationsWireless Personal Communications: An International Journal10.1007/s11277-017-5157-499:2(893-914)Online publication date: 1-Mar-2018
      • (2017)Dynamic Detection and Prevention of Clone Attack in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-016-3357-y94:4(2043-2054)Online publication date: 1-Jun-2017
      • Show More Cited By

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media