Abstract
In unattended wireless sensor networks (UWSNs), static sensor nodes monitor environment, store sensing data in memory temporally. Mobile sink patrols and collects the sensors’ data itinerantly. Mobile sink is granted with more permissions than static sensor nodes, rendering it more attractive to the adversary. By compromising the mobile sinks, the adversary can not only seek the sensing data, but it also can steel all kinds of keys and access permissions, which may be abused to undermine other benign sensor nodes, even worse to upset the whole network. Currently, many related works focus on key management, permission management to restrict the compromised mobile sink or authentication to guarantee data reliability. However, the issue of compromised mobile sinks attracts little attention, and gradually become one obstacle to the application of UWSNs.
In this paper, we proposed a secret-sharing method for detecting compromised mobile sink in UWSNs. Before the sensing data are collected by the mobile sink, every sensor node splits the digest of its data into shares by using a polynomial secret sharing algorithm, and dispatches these secret shares to randomly chosen neighbor nodes, which thereafter send to the base-station through different routes. After enough shares are gathered, the base-station recovers the original data digest, which will be used to validate the sensing data submitted by the mobile sink. If the validation fails, it reveals a compromised mobile sink. Theoretical analysis and evaluation indicate the effectiveness and efficiency of our method. Also, we proposed two types of attacking model of the mobile adversary, and obtained the respective detection probability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, A.W., Abdullah, A.H., Anisi, M.H., Bangash, J.I.: A comprehensive study of data collection schemes using mobile sinks in wireless sensor networks. Sensors 2014(14), 2510–2548 (2014)
Di Pietro, R., et al.: Data security in unattended wireless sensor networks. IEEE Trans. Comput. 58(11), 1500–1511 (2009)
Reddy, S.K.V.L., Ruj, S., Nayak, A.: Distributed data survivability schemes in mobile unattended wireless sensor networks. In: Global Communications Conference (GLOBECOM 2012), Anaheim, California, USA, pp. 979–984. IEEE Press (2012)
Chen, C., Gao, X.B., Pei, Q.Q., et al.: A tactics to alleviate influence of denial-of-sleep attack in WSN. J. Jiangsu Univ. Nat. Sci. Ed. 31(5), 570–575 (2010)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Culpepper, B.J., Tseng, H.C.: Sinkhole intrusion indicators in DSR MANETs. In: Proceedings of 1st International Conference on Broadband Networks (Broad-Nets 2004), San Jose, California, USA, pp. 681–688. IEEE Press (2004)
Khan, W.Z., Aalsalem, M.Y., Saad, N.M.: Distributed clone detection in static wireless sensor networks: random walk with network division. PLoS One 10(5), e0123069 (2015)
Mishra, A.K., Turuk, A.K.: Node coloring based replica detection technique in wireless sensor networks. Wirel. Netw. 20(8), 2419–2435 (2014)
Contia, M., Pietro, R., Di Spognardic, A.: Clone wars: distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci. 80(3), 654–669 (2014)
Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks. In: Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), San Francisco, USA, pp. 597–599. IEEE Press (2008)
Xing, K., Cheng, X.: From time domain to space domain: detecting replica attacks in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA, pp. 1–9. IEEE Press (2010)
Wang, L.M., Shi, Y.: Patrol detection for replica attacks on wireless sensor networks. Sensors 2011(11), 2496–2504 (2011)
Song, H., Zhu, S., Zhang, W., et al.: Least privilege and privilege deprivation: toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN), 4(4) (2008). Article 23
Liu, Z., Ma, J., Park, Y., et al.: Data security in unattended wireless sensor networks with mobile sinks. Wirel. Commun. Mob. Comput. 12(13), 1131–1146 (2012)
Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mob. Comput. 4(3), 297–309 (2005)
Du, X.: Detection of compromised sensor nodes in heterogeneous sensor networks. In: Proceedings of the IEEE 2008 International Conference on Communications (ICC 2008), Beijing, China, pp. 1446–1450. IEEE Press (2008)
Yang, Y., Wang, X., Zhu, S., et al.: Distributed software-based attestation for node compromise detection in sensor networks. In: Proceedings of 26th IEEE International Symposium on Reliable Distributed Systems, Beijing, China, pp. 219–230. IEEE Press (2007)
Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73275-4_15
Jin, X., Putthapipat, P., Pan, D., et al.: Unpredictable software-based attestation solution for node compromise detection in mobile WSN. In: Proceedings of the IEEE 2010 GLOBECOM Workshops (GC Wkshps), Miami, Florida, USA, pp. 2059–2064. IEEE Press (2010)
Sei, Y., Ohsuga, A.: Need only one bit: light-weight packet marking for detecting compromised nodes in WSNs. In: Proceedings of the 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), Barcelona, Spain, pp. 134–143. IARIA (2013)
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006). https://doi.org/10.1007/11734666_9
Conti, M., Di Pietro, R., Mancini, L.V., et al.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, pp. 214–219. ACM (2008)
Conti, M., Di Pietro, R., Mancini, L.V., et al.: Mobility and cooperation to thwart node capture attacks in manets. EURASIP J. Wirel. Commun. Network. 2009(1), 945943 (2009)
Ding, W., Yu, Y., Yenduri, S.: Distributed first stage detection for node capture. In: Proceedings of 2010 IEEE GLOBECOM Workshops (GC Wkshps), Miami, USA, pp. 1566–1570. IEEE Press (2010)
Dimitriou, T., Sabouri, A.: Pollination: a data authentication scheme for unattended wireless sensor networks. In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha, China, pp. 409–416. IEEE Press (2011)
Acknowledgment
This work is supported by the National Natural Science Foundation of China under Grant No. 61272074 and No. U1405255, the Key Research & Development Project of Jiangsu Province under Grant No. BE2015136, and the Industrial Science and Technology Foundation of Zhenjiang City under Grant No. GY2013030.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, X., Wang, L. (2018). Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-8890-2_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8889-6
Online ISBN: 978-981-10-8890-2
eBook Packages: Computer ScienceComputer Science (R0)