Professional Documents
Culture Documents
Review
State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, 19A Yuquan Road, Beijing 100049, China
Cryptography & Security Department, Institute for Infocomm Research, 1 Fusionopolis Way, Singapore 138632, Singapore
School of Information Systems, Singapore Management University, 80 Stamford Road, Singapore 178902, Singapore
a r t i c l e i n f o
a b s t r a c t
Article history:
Received 5 September 2011
Received in revised form
14 December 2011
Accepted 12 January 2012
Available online 4 February 2012
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained
sensor nodes, but is often deployed in unattended and harsh environments to perform various
monitoring tasks. As a result, WSNs are susceptible to many application-dependent and applicationindependent attacks. In this paper we consider a typical threat in the latter category known as the node
replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the
network into accepting them as legitimate ones. To do so, the adversary only needs to physically
capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy
the replicas under her control into the network, possibly at strategic positions, to cripple various WSN
applications with little effort. Defending against such node replication attacks has recently become an
imperative research topic in sensor network security, and the design issues may involve different and
more threatening challenges than detecting typical application-dependent attacks. In this survey, we
classify existent detections in the literature, and explore the various proposals in each category. We
look into necessary technical details and make certain comparisons, so as to demonstrate their
respective contributions as well as limitations. We also present the technical challenges and indicate
some possible directions for future research.
& 2012 Elsevier Ltd. All rights reserved.
Keywords:
Wireless sensor network
Security
Node replication attack
Detection
Contents
1.
2.
3.
4.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
2.1.
Sensor Node Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
2.2.
Network-related discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
2.3.
Intrusion detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
2.4.
A quick overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
Centralized detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
3.1.
Straightforward scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
3.2.
Set operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
3.3.
Detecting cloned keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
3.4.
Fingerprint verication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
3.5.
Speed test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
Distributed detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
4.1.
Node-to-network broadcasting (N2NB). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
4.2.
Deterministic multicast (DM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
4.3.
Randomized multicast (RM) and line-selected multicast (LSM). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028
4.3.1.
RM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028
4.3.2.
LSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028
4.3.3.
Countering counterattacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
4.4.
Single deterministic cell (SDC) and parallel multiple probabilistic cells (P-MPC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
1023
4.5.
4.6.
4.7.
4.8.
5.
1. Introduction
Technological advances have made it possible to develop tiny
commodity sensor nodes with off-the-shelf hardware at very low
cost. It is convenient to deploy a wireless sensor network (WSN)
which is a distributed and self-organized network consisting of a
number of such sensor nodes, to inaccessible and even hazardous
areas to perform various monitoring tasks. For example, current
implementations monitor factory instrumentation, pollution levels,
freeway trafc, and the structural integrity of buildings. Other
applications include climate sensing, control in ofce buildings,
and home environmental sensing systems for temperature, light,
moisture, and motion (Chan and Perrig, 2003). WSNs are quickly
gaining popularity owing to the fact that they are economically
viable solutions to a variety of real-world challenges. However,
because of inherent constraints (e.g., sensor nodes are not made
tamper-resistant due to cost considerations), security in WSN also
poses signicant challenges. The proliferation of WSNs will inevitably extend to criminals who can use them for illegal purposes, and
the security issues posed by WSNs represent a rich eld of research
problems (Chan and Perrig, 2003).
Threats to sensor networks can be either application-dependent or application-independent. Attacks in the former category
target specic network functionalities such as routing (Karlof and
Wagner, 2003), node localization (Poovendran et al., 2007; Sun
et al., 2007), time synchronization (Poovendran et al., 2007), data
aggregation (Sun et al., 2007; He et al., 2007), and so on, while
attacks in the latter category affect a wide variety of applications
from object tracking and re alarming to battleeld surveillance.
Until recently, research on intrusion detection in WSNs has
focused on the former category (see a recent survey Sun et al.,
2007 for an example, where application-independent detection is
completely absent).
In this work, we consider a typical application-independent
threat known as the node replication (a.k.a. clone) attack (Parno
et al., 2005), where an adversary prepares her own commodity
sensor nodes out of off-the-shelf sensor hardware and induces the
network to accept them as legitimate ones. Such a vexing
problem arises from the fact that sensor nodes are typically
unshielded. According to Deng et al. (2005), only a few readily
available tools are needed for complete compromise of a typical
sensor node, and an attacker could obtain copies of all the nodes
memory and data (including cryptographic keys) within 1 min of
discovering it, given the proper level of experience. On one
hand, the fact that sensor nodes are not made tamper-resistant
contributes to WSNs economical feature and thus its wide
adoption. On the other hand, such a low-cost design principle
is highly exploitable by an adversary; she only needs to capture
one genuine sensor node from the network, replicate it with
the exposed secret credentials like codes and cryptographic
materials, and then insert the duplicated nodes at chosen network
locations to undermine the upper-layer applications with little
effort.
1024
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
2. Preliminaries
Before one can dive into the nuts and bolts of a concrete
replication detection protocol (particularly a distributed one),
there are certain building blocks that we need to make clear.
This also gives us a chance to conduct certain clarication and
classication.
2.1. Sensor Node Identity
Since sensor nodes are produced in large quantity out of the
same hardware, each node in a WSN is assigned and then identied
by its software identity, id for short. The replicated sensor nodes are
the same with the original node captured from the network;
everything including the id has to be cloned (though sometimes
based on their roles they may be strategically reprogrammed
slightly differently). If the secret credentials are cloned but the id
is not, the attack is very likely to fail. Herein the point lies in that a
key management scheme for WSNs can bind the keys preloaded to a
node to its id, so that all the cryptographic behaviors of a node are
tied to its id.
Take symmetric pairwise key assignment for example. If a
replicated node claims an id different from that of the originally
captured node, it will be immediately revealed when it is unable
to employ certain pairwise keys that it is supposed to possess (i.e.,
keys bound to the claimed id). Alternatively but more importantly, the id-based public key cryptosystem binds ones public
key (and thus the corresponding private key for signing a
message) to ones id. With an id-based signature scheme, it is
very convenient for a sensor node to authenticate itself to others,
and id-based signature has been necessarily adopted in replication detections since (Parno et al., 2005). Extensive discussions of
the id-based signature technique can be found in Parno et al.
(2005). Recent advances in id-based signature schemes for sensor
nodes (along with real implementation) can be found in Liu et al.
(2010).
An attack supercially similar to the node replication attack is
the Sybil attack (Newsome et al., 2004), where one physical sensor
node gains an unfair advantage by claiming multiple ids. The Sybil
attack is also application-independent and enables one malicious
node to multiply its inputs to subvert many protocols like
distributed storage, routing, data aggregation, voting/agreement,
resource allocation, and so on (Newsome et al., 2004); it is just
like the opposite of replication attack, where one logical node id is
reused by multiple physical sensor nodes. The Sybil attack is
outside the scope of this survey article, but is often mentioned in
research efforts against replication attacks (e.g., Parno et al., 2005;
Conti et al., 2007; Brooks et al., 2007; Zhu et al., 2007) as a related
note. Some (Conti et al., 2007) regard Sybil attack as orthogonal to
replication attack. Indeed, if an id-based signature scheme is
adopted, then the adversary cannot associate a compromised
node with extra ids due to not being able to generate the
corresponding private keys. Nevertheless, the id-based signature
only binds a nodes public/private key pair to its node id, but by
itself does not counteract the replication attack.
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
1025
Fig. 1. The big picture for node replication detection in wireless sensor networks,
with an elementary taxonomy. The state of art is represented by the distributed
detections, which typically employ id-based signature and geographic routing as
two building blocks.
3. Centralized detection
In this section we briey investigate ve representative but
distinct centralized replication detection schemes. Besides their
contributions, their respective limitations are also pinpointed,
many of which are found to be fairly serious. In general,
centralized detections barely have an advantage over distributed
detections, which are the topic of the next section and the
emphasis of this survey. Consequently, we do not further compare
the proposals in the centralized category against each other.
3.1. Straightforward scheme
The most straightforward detection scheme is outlined in
Parno et al. (2005) (and similar to the centralized node registration method in Newsome et al., 2004). It requires each node to
send a list of its neighbors (more specically, a list of their ids)
and the positions claimed by these neighbors (and signed by
them, e.g., with an id-based signature scheme) to the base station,
which then examines every neighbor list to look for replicated
sensor nodes. In a stationary WSN, conicting position claims for
one node id indicates a replication. Once the base station spots
one or more replicas, it can revoke the replicated nodes by
ooding the network with an authenticated revocation message,
e.g., employing mTESLA (Perrig et al., 2002) or id-based signature
(see Section 2.1) for broadcast authentication.
While conceptually simple, this approach suffers from several
drawbacks (Parno et al., 2005) inherent in a centralized system.
First, the base station introduces a single point of failure and can
become a signicant bottleneck. Second, the nodes close to the
base station, referred to as hotspots hereinafter, will receive the
brunt of the routing load and thus will quickly deplete their
power supply (usually by irreplaceable batteries). Network connectivity may then be seriously affected. Moreover, besides the
base station, these hotspots will also become attractive targets for
attacks. Third, this approach may incur observable processing
1026
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
delay, since the base station has to wait for telling reports (to
propagate hop-by-hop and eventually converge), analyze them to
conrm conicts, and then ood revocations throughout the network. Fourth, some WSNs may not have the luxury of a powerful
base station.
3.2. Set operations
Choi et al. (2007) proposed another centralized detection
known as SET, which attempts to reduce the detection overhead
by computing set operations (intersection and union) of
exclusive subsets in the network. We conjecture that the underling idea is borrowed from secure WSN data aggregation employing network clustering (e.g., He et al., 2007): SET logically
partitions the network into non-overlapping regions (clusters)
respectively managed by leaders (cluster heads), and has these
leaders respectively report to the base station all the ids of the
nodes (including the leader herself) in the region, in the form of a
subset (which is a subset of all node ids network-wide). Intuitively, the intersection of any two subsets of reports should be
empty; otherwise, a replication is detected. Essentially, all node
ids in the network are pulled up by the base station and left to its
discretion.
Although SET declares reduced number of message transmissions, its comparison with other schemes (e.g., with RM and LSM
Parno et al., 2005, which are both distributed solutions; see the
next section) is not a fair one; the claimed reduction in the
number of message transmissions is just the result of increased
size per message (simply due to the union operation, i.e.,
combination). Therefore, one may have to question how a
centralized WSN solution like SET (Choi et al., 2007) can compare
with distributed ones like RM and LSM (Parno et al., 2005).
Interestingly, in Choi et al. (2007) it is exactly noted that reporting
every nodes id to the base station may cause the size of the report
to become too large, and this problem can be addressed by
using randomized optimization, where a leader (cluster head)
only generates a report of randomly selected members instead of
all nodes in the managed region (cluster). However, such optimization necessitates multiple rounds of reports (actually, this is
also pointed out in Choi et al., 2007), in each of which a certain
part of the members in a region is reported. Taking additional
security mechanisms such as message authentication codes into
consideration, such multiple-round optimization inevitably
results in even higher detection cost in terms of computation
and communication.
Although the above review by us may not be difcult to understand, the actual SET protocol (Choi et al., 2007) is highly complex
due to its complicated components (like authenticated subset
covering and interleaved authentication following Zhu et al.,
2004), which also contribute to increased overload. The real communication cost of SET is left in Choi et al. (2007) as unclear and for
future work. Moreover, the SET protocol may have to be performed
multiple rounds just to counter colluding replicas. Furthermore, an
unexpected design aw of SET is reported in Conti et al. (2011): an
adversary can misuse the detection protocol to revoke honest nodes.
A detection scheme similar to SET (but less known) is found in
Znaidi et al. (2009). It passes the workload of the base station on
to the cluster heads themselves.
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
4. Distributed detection
All the centralized solutions bear similar deciencies (Parno
et al., 2005). For example, any compromise of the base station (or
the communication channel around it) will render the solution
useless. For another example, even if there are no attacks, the
nodes surrounding the base station (i.e., the hotspots) will suffer
an undue communication burden that may shorten the life
expectancy of the WSN. All these make a distributed solution a
necessity. At rst glance it seems easy to design a decentralized
detection protocol, for example, by localizing the straightforward
scheme in Section 3.1, in a way similar to the neighbor position
verication approach in Newsome et al. (2004). However, such a
local detection may not be able to handle the case where no two
replicas share a neighbor. In fact, the rst set of nontrivial
distributed detections was proposed only recently (Parno et al.,
2005). Next, we focus on the relatively more mature schemes (i.e.,
distributed detections for stationary WSNs) and analyze their
respective pros and cons. We summarize in Table 1 the symbols
and parameters commonly employed by distributed detections.
4.1. Node-to-network broadcasting (N2NB)
A plausible approach to distributed detection of replicated
nodes is the decentralized (but network-wide) version of the
straightforward scheme in Section 3.1: Every node collects all its
neighbors ids and their positions, and oods the entire network
with this information employing authenticated broadcast. When
a node receives a broadcast message, it compares those nodes
Table 1
Notions for distributed replication detection.
IDa
la
/IDa ,la S
n
d
p
g
s
ps
Identier of node a
Deployment location claimed by node a
Location claim (with an id-based signature)
Network size (no. of nodes in the WSN)
Network density (average node degree)
The probability a neighbor becomes a reporter
No. of witnesses contacted by one reporter
Cell size (no. of nodes that a cell should contain)
The probability a node in the destination cell becomes a witness
1027
listed in the message with its own neighbors. Once nodes that
have conicting positions are spotted, they can be revoked also
with authenticated broadcasts. The major concern with this
approach is its prohibitive communication cost.
A similar but slightly simplied approach is the node-tonetwork broadcasting (Parno et al., 2005), N2NB for short, where
each node oods the entire network with authenticated broadcast
to claim its own location (instead of its neighbors). Each node
stores the location information for its neighbors, incurring a
storage cost of Od. Each node upon receiving a conicting claim
invokes a revocation procedure against the offending nodes, and
eventually any replica will be cut off by all its neighbors (thus
isolated from the WSN). The N2NB protocol achieves 100%
detection rate as long as the broadcasts reach every node. Assume
the network size is n and certain duplicate suppression algorithm
is employed so that each node only broadcasts a given message
once. Then each location broadcast incurs On messages, as
generally every node in the WSN has to be involved for hop-byhop propagation. For n broadcasts, the total communication cost
for N2NB is On2 . Given the simplicity of the scheme and the
detection rate achieved, this On2 cost may be justiable for
small WSNs.
The challenge for detecting replication attacks has roots in the
resource scarcity of sensor nodes. For stationary WSNs, such
detection essentially requires network-wide comparison of location-dependent authentication information, and the limited
memory capacity and energy supply place severe constraints on
how much authentication information can be stored per node and
exchanged in the network (Zhang et al., 2009). Hence it is
reasonable to trade the detection rate (e.g., 100% for N2NB) for
other major performance criteria like energy efciency and
memory efciency. Note that the wireless transceiver is the
biggest energy consumer for sensor nodes, while the communication cost for N2NB is On2 .
4.2. Deterministic multicast (DM)
The DM protocol is actually a negative (or unappealing)
example given in Parno et al. (2005), and has thus received
relatively less attention. However, we nd it a good example to
illustrate the claimerreporterwitness framework; we even
believe it has directly inspired other solutions like SDC and
P-MPC (Zhu et al., 2007), though both schemes are proposed in
Zhu et al. (2007) under another brand localized multicast (see
Section 4.4). The design goal for DM is reduced communication
cost, and the main idea is to only send a nodes location claim to a
limited set of deterministically chosen nodes serving as witnesses.
Next, we outline DM as follows.
When a node, referred to as the claimer, locally broadcasts its
location claim to its neighbors, each neighbor, serving as a reporter,
employs a function to map the claimer id to a witness. Then the
neighbor forwards the claim to the witness, which will receive two
different location claims for the same node id if the adversary has
replicated a node. One immediate issue arises: the adversary can also
employ the function to know about the witness for a given claimer id,
and may locate and compromise the witness node before she inserts
the replicas into the WSN so as to evade the detection. To alleviate
this problem, DM employs g instances of a function so that one
claimer id is mapped to g different witnesses (hence the adversary
needs g times more effort to thwart the detection by DM). Nevertheless, each of the d neighbors does not necessarily need to forward
the location claim to each of all g witnesses. Assume they do not
collaborate, i.e., each reporter behaves independently. The wellstudied coupon collectors problem (Cormen et al., 2001) tells us
P
that if the reporters randomly select in all g gi 1 1=i gln g 0:58
repeatable destinations from all g witnesses for the claimer, then
1028
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
Table 2
Summary of protocol costs: network-wide communication and memory consumption per node.
Detection protocol
Communication
Storage
On2
p
Og ln g n n
On2
p
On n
p
Odp n n Os n
p
Odp n n Os n
p
Odpg n n
p
On n
p
Od n n
Od
Og ln g
p
O n
p
O n
Osps
Osps
Odpg
p
O n
Od
each witness will probably receive at least one location claim. Hence,
each reporter only needs to select g ln g=d random witnesses as the
forwarding destinations.
Each sensor node in the network both is a claimer and plays
the role of a witness, if the 1-to-g mapping is well designed.
Therefore, each node in the network stores on average 1=n
P
g gi 1 1=i n g ln g location claims. Assume the WSN deployment approximates any regular polygon. Then the average netp
work path length is O n, resulting in an overall communication
p
cost of Og ln g n n messages. (Table 1 in Parno et al. (2005)
summarizes the costs for the proposals, where DMs networkp
wide communication cost is labeled as Og ln g n=d and DMs
memory cost per node is labeled as Og; we believe both
inaccuracies there are due to analysis oversights, and similarly,
we summarize the performance analysis later in our Table 2.)
DM is treated as an unfavorable protocol in Parno et al. (2005)
because it does not provide much security. Since the 1-to-g
mapping is deterministic, an adversary only needs to compromise
all the g witnesses for a given claimer id to prevent the conicting
reports from converging, so that she can deploy as many replicas
with that id as she desires but without triggering any alarm, as
long as no two replicas share a neighbor. The dilemma for DM is
that a large g (for improved resilience) is not affordable because
both the network communication and the node storage are
proportional to g ln g, and yet a small g may allow the adversary
almost unlimited replication ability.
4.3. Randomized multicast (RM) and line-selected multicast (LSM)
Since DM is unappealing for its deterministic property, Parno
et al. (2005) developed two probabilistic algorithms RM and LSM,
which are generally accepted as the pioneering full-edged replica
detections. RM distributes node location claims to a randomly
selected set of witnesses, exploiting certain combinatorics theory
(the birthday paradox Cormen et al., 2001) to detect replicas, while
LSM exploits the routing topology of the network to nominate
additional witnesses for a claimer and utilizes geometric probability
for the detection. RM and LSM still follow the claimerreporter
witness approach, but the witnesses become unpredictable for the
adversary. Therefore, both schemes can be regarded as improvements of the above DM. They trade efciency for security, i.e.,
increased resistance is achieved at the price of also increased
communication and/or memory consumption. Both are based on
the emergent properties (Gligor, 2004), while further modications
and tradeoffs are possible (as to be shown in subsequent subsections). One major difference between RM and LSM lies in that in the
former protocol the reporters randomly select several witnesses,
while in the latter protocol nodes forwarding a location claim (i.e.,
on the path from a reporter to the corresponding witness) also save
the claim for inspection, serving as additional witnesses. Next, we
review them respectively. For completeness/clearness and also a
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
1029
Fig. 2. Randomized multicast (left) and line-selected multicast (right) following the claimerreporterwitness framework, where the red hexagons stand for claimers with
the same node id, green/blue circles stand for reporters, and green/blue squares stand for witnesses. The squares with two colors (green and blue) stand for the common
witnesses that detect the conict. (For interpretation of the references to color in this gure legend, the reader is referred to the web version of this article.)
claim propagates from a reporter to a witness, all the intermediate nodes on the forwarding path also learn about the information, and can serve as additional witnesses, as shown in Fig. 2.
Hence whenever a conicting location claim by a replica a0
crosses the forwarding path for a, the intermediate node at the
intersection of the two paths can detect the conict, i.e., an
intersection corresponds to a detection of the replication attack.
This idea can be compared to the following geometric theorem:
for x randomly drawn lines within a circle, the expected number
of intersections is about 0:339xx1, and thus we only need a few
such lines to insure an intersection (e.g., with only x 3 random
lines we expect 2 collisions).
In LSM, the product dpg (inherited from RM) is xed and set to
p
a very small constant r ( 5 n). Each location claim from a node a
is forwarded to r random nodes following the claimerreporter
witness framework, but the intermediate nodes on the r forwarding paths also save a copy of the claim. Once another location
claim /IDa0 IDa ,la0 a la S is received by a witness (either
selected by a reporter, or more likely, an additional one), it oods
the network with the unforgeable evidence to exclude both a and
a0 . One may notice that LSM actually draws r line segments
(paths) that originate from reporters around a central point (the
claimer node) and radiate out in random directions (to r random
witnesses), instead of random lines (as in the aforementioned
geometric theorem). However, even so, simulations indicate that
even if there is only one replica (i.e., r random paths radiate from
a, another r paths from a0 ), setting r 2 assures that the probability for generating at least one intersection (i.e., the detection
rate Pd) is above 56%, and r 5 leads to 95%. Similar reliability
holds for realistic WSN deployment elds with irregular topologies far different from a circular domain. Compared with RM, LSM
p
has the network communication cost scaling as O n n r, i.e.,
p
p
On n, and an average node storage cost of 1=n r n n
p
location claims scaling as O n.
Alternatively, since the witnesses for any claimer become unpredictable in RM and LSM, an adversary may turn to compromise all
the d neighbors of a replica so as to prevent a location claim from
propagating to any witness (actually, to eliminate the reporters at
all). Such a masked replication attack can be addressed with
pseudo-neighbors (Parno et al., 2005) (eventually, additional reporters). Nevertheless, as indicated in Conti et al. (2011), it is possible
for such a replica (whose neighbors have all been compromised) to
lie about its physical position (hence the location claim), which may
be a common drawback of all location-based replication detections.
4.4. Single deterministic cell (SDC) and parallel multiple probabilistic
cells (P-MPC)
Zhu et al. (2007) proposed two schemes SDC and P-MPC under
the brand localized multicast. Essentially both are variants of
DM (Section 4.2), and can be parsed as network-wide deterministic multicast, followed by in-cell broadcast and probabilistic
storage. In both schemes, the WSN deployment eld is considered
as a geographic grid of cells, and a location claim from node a is
sent by its reporters to g 1 (SDC) or g 41 (P-MPC) cells for in-cell
broadcast, the cell id(s) of which is/are deterministically mapped
from IDa ; each node in the destination cell(s) then probabilistically chooses to be a witness by saving the claim. If there is a
replica a0 , its location claim is sent to the same cell(s) for in-cell
broadcast, and thus the witnesses can spot the conict.
One may remark that the concept localized multicast advocated in Zhu et al. (2007) is not very exact. Both schemes also bear
a similar dilemma with DM (Section 4.2) that if the cell size s is
too large, they incur expensive communication cost like N2NB
(Section 4.1); if s is too small, they degenerate back to DM, and an
adversary can defeat both schemes by compromising all nodes in
the g deterministic tiny cells. Note that in the latter case (a very
small s), all prospective witnesses in one cell are deployed close to
each other within a geographically limited region instead of
sparsely spreading throughout the deployment eld, and thus it
is easy for an adversary to physically approach and compromise
them once for all. Therefore, the practicality of SDC and P-MPC
relies on careful selection of s. Unfortunately, in Zhu et al. (2007)
the critical issue of choosing an appropriate cell size s is overlooked; for all provided examples, s is set to 100 nodes without
any explanation/discussion. In practice, one needs to choose s
carefully to nd an appropriate tradeoff between efciency and
security.
Another problem omitted in Zhu et al. (2007) is what we term
the indistinguishable dilemma. Take SDC for example. Once a
location claim by node a arrives at the destination cell, it should
be ooded within the cell so that each node in the cell independently stores the claim (i.e., becomes a witness) with probability
ps. To reduce the in-cell broadcast overhead, SDC requires that the
1030
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
1031
Fig. 3. Relationship between the most well-known distributed node replication detections in the state of the art accommodated by the claimerreporterwitness
framework.
1032
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
5. Concluding remarks
In this paper, we addressed a unique yet application-independent problem in WSN security known as the node replication
attack. As depicted in Fig. 1, we classied mainstream detection
protocols as centralized and distributed, and reviewed the literature with a focus on the latter category. For distributed solutions,
the detection overheads are summarized in Table 2 for a quick
comparison. Note that B-MEM (Zhang et al., 2009) is selected as a
representative of the MEM family (Section 4.6). In Table 2 we do
not compare the detection rates because different detections
assume quite different scenarios (regarding deployment eld
topology, grid division, ability for network-wide spontaneous
change of a random seed, etc.). Moreover, the detection rates
sometimes may be analytically inferred (e.g., for RED Conti et al.,
2007), but often may not (i.e., can only be obtained heuristically
with simulations, like for LSM Parno et al., 2005 and the MEM
family Zhang et al., 2009).
Due to quite different motivations and assumptions behind
these research efforts as well as their respective strengths and
weaknesses, it may be inappropriate to make general and denite
remarks that which is the most promising or which are better
than the others. For example, even the relatively naive N2NB
(which obviously incurs the highest communication overhead
among all schemes, recall Section 4.1) may be preferable for a
very small WSN due to its simplicity and intuitiveness, while
more sophisticated schemes are found in the three protocols
pioneered in Parno et al. (2005) (i.e., DM, RM, and LSM) and their
various derivatives (see Fig. 3). Nevertheless, we summarize in
Table 3 the different scenarios considered in all the solutions that
have been included in Fig. 3. This helps us better understand the
emphases and tradeoffs of respective proposals, though a comparison like this has generally been overlooked in the literature.
The recent research has so far been striving for solutions that
incur less communication and occupy less memory, and this trend
will continue towards more efcient detection schemes. Moreover, we notice one factor that has received relatively less
attention in replication detection is the computational cost
involved. It is reasonable to count on this additional metric when
evaluating various detection schemes besides network communication and node storage overheads. Adding more generic
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
Table 3
Comparison between the scenarios in replica detections under the claimer
reporterwitness framework.
Protocol
Acknowledgments
We would like to thank the anonymous reviewers for their
constructive comments. This work was supported by the National
Natural Science Foundation of China under Grant 60970138.
References
Bekara C, Laurent-Maknavicius M. A new protocol for securing wireless sensor
networks against nodes replication attacks. In: Proceedings of the 3rd IEEE
international conference on wireless and mobile computing, networking and
communications (WiMob07); 2007. October.
Bonaci T, Bushnell L, Poovendran R. Node capture attacks in wireless sensor
networks: a system theoretic approach. In: Proceedings of the 49th IEEE
conference on decision and control (CDC10); 2010. p. 676572, December.
Boukerche A, Oliveira HABF, Nakamura EF, Loureiro AAF. Localization systems for
wireless sensor networks. IEEE Wireless Communications 2007;14(December):
612.
Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, Kandemir MT. On the
detection of clones in sensor networks using random key predistribution. IEEE
Transactions on Systems, Man, and Cybernetics, Part C: Applications and
Reviews 2007;37(November):124658.
Chan H, Perrig A. Security and privacy in sensor networks. Computer
2003;36(October):1035.
Choi H, Zhu S, La porta TF. SET: detecting node clones in sensor networks. In:
Proceedings of the 3rd international conference on security and privacy in
communications networks and the workshops (SecureComm07); 2007.
p. 34150, December.
Conti M, Di Pietro R, Mancini LV, Mei A. Requirements and open issues in
distributed detection of node identity replicas in WSN. In: Proceedings of
the 2006 IEEE international conference on systems, man, and cybernetics
(SMC06); 2006. p. 146873, October.
Conti M, Di Pietro R, Mancini LV, Mei A. A randomized, efcient, distributed
protocol for the detection of node replication attacks in wireless sensor
network. In: Proceedings of the 8th ACM international symposium on mobile
Ad Hoc networking and computing (MobiHoc07); 2007. p. 809, September.
1033
Ruhrup
S. Theory and practice of geographic routing. In: Liu H, Leung Y-W, Chu X,
editors. Ad hoc and sensor wireless networks: architectures, algorithms and
protocols. Bentham Science Publishers; 2009.
Sei Y, Honiden S. Reporter node determination of replicated node detection in
wireless sensor networks. In: Proceedings of the 3rd international conference
on ubiquitous information management and communication (ICUIMC09);
2009. p. 56673. January.
1034
W.T. Zhu et al. / Journal of Network and Computer Applications 35 (2012) 10221034
Song H, Xie L, Zhu S, Cao G. Sensor node compromise detection: the location
perspective. In: Proceedings of the 3rd international conference on wireless
communications and mobile computing (IWCMC07); 2007. p. 2427. August.
Sun B, Osborne L, Xiao Y, Guizani S. Intrusion detection techniques in mobile ad
hoc and wireless sensor networks. IEEE Wireless Communications
2007;14(October):5663.
Xie M, Han S, Tian B, Parvin S. Anomaly detection in wireless sensor networks: a
survey. Journal of Network and Computer Applications 2011;34(July):
130225.
Xing K, Cheng X. From time domain to space domain: detecting replica attacks in
mobile ad hoc networks. In: Proceedings of the 29th IEEE conference on
computer communications (INFOCOM10); 2010. March.
Xing K, Liu F, Cheng X, Du DHC. Real-time detection of clone attacks in wireless
sensor networks. In: Proceedings of the 28th international conference on
distributed computing systems (ICDCS08); 2008. p. 310. June.
Yu C-M, Lu C-S, Kuo S-Y. Mobile sensor network resilient against node replication
attacks. In: Proceedings of the 5th IEEE communications society conference on
sensor, mesh and ad hoc communications and networks (SECON08); 2008.
p. 5979. June.
Yu C-M, Lu C-S, Kuo S-Y. Efcient and distributed detection of node replication
attacks in mobile sensor networks. In: Proceedings of the 70th IEEE vehicular
technology conference (VTC09-Fall); 2009. September.
Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identication in wireless networks. IEEE Wireless Communications 2010;17(October):
5662.
Zhang Y, Liu W, Lou W, Fang Y. Location-based compromise-tolerant security
mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in
Communications 2006;24(February):24760.
Zhang Q, Yu T, Ning P. A framework for identifying compromised nodes in wireless
sensor networks. ACM Transactions on Information and Systems Security
2008;11(March):12:137.