Sensor node compromise detection: The location perspective

Hui Song, Liang Xie, Sencun Zhu, Guohong Cao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Scopus citations

Abstract

Node compromise is a serious security threat that hinders the successful deployment of large-scale wireless sensor networks. A node compromise often consists of three stages: physically obtaining and compromising the sensors, redeploying the compromised sensors, and compromised nodes launching attacks after their rejoining the network. By far, all the proposed compromise detection schemes address this problem at the third stage. In this paper, we make the first attempt to detect node compromise at the second stage. Our motivation is that for some applications an attacker may not be able to precisely deploy the compromised sensors back into their original positions. Thus, the detection of location change will become an indication of a potential node compromise. We name this node redeployment detection problem. We propose two approaches to detect node redeployment, based on the change of node neighborship and the change of measured distances between nodes, respectively. Our simulation study shows that both schemes can detect node redeployment effectively (with low false positive rate and high detection rate).

Original languageEnglish (US)
Title of host publicationIWCMC 2007
Subtitle of host publicationProceedings of the 2007 International Wireless Communications and Mobile Computing Conference
Pages242-247
Number of pages6
DOIs
StatePublished - Dec 14 2007
EventIWCMC 2007: 2007 International Wireless Communications and Mobile Computing Conference - Honolulu, HI, United States
Duration: Aug 12 2007Aug 16 2007

Publication series

NameIWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference

Other

OtherIWCMC 2007: 2007 International Wireless Communications and Mobile Computing Conference
CountryUnited States
CityHonolulu, HI
Period8/12/078/16/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Sensor node compromise detection: The location perspective'. Together they form a unique fingerprint.

  • Cite this

    Song, H., Xie, L., Zhu, S., & Cao, G. (2007). Sensor node compromise detection: The location perspective. In IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference (pp. 242-247). (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference). https://doi.org/10.1145/1280940.1280993