SET: Detecting node clones in sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

121 Scopus citations

Abstract

Sensor nodes that are deployed in hostile environments are vulnerable to capture and compromise. An adversary may obtain private information from these sensors, clone and intelligently deploy them in the network to launch a variety of insider attacks. This attack process is broadly termed as a clone attack. Currently, the defenses against clone attacks are not only very few, but also suffer from selective interruption of detection and high overhead (computation and memory). In this paper, we propose a new effective and efficient scheme, called SET, to detect such clone attacks. The key idea of SET is to detect clones by computing set operations (intersection and union) of exclusive subsets in the network. First, SET securely forms exclusive unit subsets among one-hop neighbors in the network in a distributed way. This secure subset formation also provides the authentication of nodes' subset membership. SET then employs a tree structure to compute nonoverlapped set operations and integrates interleaved authentication to prevent unauthorized falsification of subset information during forwarding. Randomization is used to further make the exclusive subset and tree formation unpredictable to an adversary. We show the reliability and resilience of SET by analyzing the probability that an adversary may effectively obstruct the set operations. Performance analysis and simulations also demonstrate that the proposed scheme is more efficient than existing schemes from both communication and memory cost standpoints.

Original languageEnglish (US)
Title of host publicationProceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm
Pages341-350
Number of pages10
DOIs
StatePublished - Dec 1 2007
Event3rd International Conference on Security and Privacy in Communication Networks, SecureComm - Nice, France
Duration: Sep 17 2007Sep 21 2007

Publication series

NameProceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm

Other

Other3rd International Conference on Security and Privacy in Communication Networks, SecureComm
CountryFrance
CityNice
Period9/17/079/21/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Fingerprint Dive into the research topics of 'SET: Detecting node clones in sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Choi, H., Zhu, S., & Porta, T. F. L. (2007). SET: Detecting node clones in sensor networks. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm (pp. 341-350). [4550353] (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm). https://doi.org/10.1109/SECCOM.2007.4550353