Font Size: a A A

Methods Of Detecting Replica Attacks In Mobile Network Based On The Spatial-Temporal Correlation

Posted on:2016-07-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ChenFull Text:PDF
GTID:2308330467494931Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Mobile network including physical network such as wireless sensor network and logical network such as social network. And a common week point in the fields of wireless networks, in particular wireless sensor network (WSN), is their susceptibility to node compromise or physical capture attacks. It is mainly due to small form factors and low cost of the wireless devices which are often not protected by tamper-resistant hardware, and can be easily stolen/lost or temporarily controlled by unauthorized entities due to their harsh working environments. A serious result is the node replication attacks in which adversaries could deploy a large number of replicas which are the compromised or captured nodes throughout the network. They have all legitimate security credentials and therefore can launch various insider attacks, or even control the whole network easily. They are extremely harmful to the network.Detecting these attacks is a difficult problem in mobile network because of the challenges resulted from node mobility, cloned or compromised node collusion, and the large number and wide spread of the replicas. Existing approaches either fail in mobile environments due to the limitations caused by local views or their dependence on invariant claims such as location and neighbor list, or are constrained by the number, distribution, and colluding activities of the replicas.In this paper, we propose two replication detection schemes (TDD and SDD) to conquer all these challenges from both the time domain and the space domain. And we introduce the differences between logical network and physical network. We use multiple matching technology to match nodes and tracks. Our analysis indicates that TDD and SDD provide high detection accuracy and excellent resilience against smart and colluding replicas, and have no restriction on the number and distribution of replicas with low communication and computation overhead. In the last part of this paper, we did a simulation of our proposed methods. The results indicated that our methods performs better than the existing clone attack methods.
Keywords/Search Tags:mobile network, wireless sensor network, clone attack, replica attack, hash chains
PDF Full Text Request
Related items