4.5 Article

Distributed detection of mobile malicious node attacks in wireless sensor networks

Journal

AD HOC NETWORKS
Volume 10, Issue 3, Pages 512-523

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.adhoc.2011.09.006

Keywords

Mobile malicious node; Intrusion detection; Sequential hypothesis testing

Funding

  1. Seoul Women's University [2011]
  2. NSF [IIS-0326505, DUE-0621280, CNS-0721951, CNS-0916211]
  3. Division Of Computer and Network Systems
  4. Direct For Computer & Info Scie & Enginr [0916221] Funding Source: National Science Foundation

Ask authors/readers for more resources

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to use location to find the source of attacks. In performing DDoS and false data injection attacks, he takes advantage of diversifying the attack paths with mobile malicious nodes to prevent network-level defenses. For attacks that disrupt or undermine network protocols like routing and clustering, moving the misbehaving nodes prevents them from being easily identified and blocked. Thus, mobile malicious node attacks are very dangerous and need to be detected as soon as possible to minimize the damage they can cause. In this paper, we are the first to identify the problem of mobile malicious node attacks, and we describe the limitations of various naive measures that might be used to stop them. To overcome these limitations, we propose a scheme for distributed detection of mobile malicious node attacks in static sensor networks. The key idea of this scheme is to apply sequential hypothesis testing to discover nodes that are silent for unusually many time periods such nodes are likely to be moving and block them from communicating. By performing all detection and blocking locally, we keep energy consumption overhead to a minimum and keep the cost of false positives low. Through analysis and simulation, we show that our proposed scheme achieves fast, effective, and robust mobile malicious node detection capability with reasonable overhead. (C) 2011 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available