Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

A New Random Walk for Replica Detection in WSNs

Abstract

Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical.

Introduction

Wireless Sensor Network (WSN) is formed by grouping resource constrained sensor nodes that are capable of sensing and communicating and thus can be employed in a wide variety of sensing applications [1, 2], like health, traffic and environment monitoring etc. WSNs are vulnerable to many harmful attacks due to the circumstances that sensors lack tamper proof hardware and are deployed in tough, antagonistic and unattended environments. Node replication attack or clone attack is the focus of this paper in which an adversary compromises one or more sensor nodes by physically capturing the nodes (compromising secret credentials) and then creates replicas or clones of the compromised nodes, finally, secretly and deliberately deploying clones at various positions of the network. These replicas or clones can target a wide variety of applications like border security, battlefield surveillance and fire alarms to object tracking. The adversaries can launch other insider attacks like blackhole, wormhole, selective forwarding and DoS attacks etc. [3, 4] by leveraging these replicas.

One possible solution to detect these clones is to equip the sensor nodes with built in hardware that is resistant to tampering but it is not economical to provide each sensor with a tamper proof hardware. Moreover, there may be still a possibility that a smart adversary can be able to evade tamper proof hardware. Therefore, software based clone detection algorithms can be a better solution. Software based solutions for clone detection in static WSNs can be categorized into two major classes, centralized and distributed.

Centralized detection schemes are based Base station or cluster head, for detecting clones [58]. But all of these techniques have disadvantages of single point of failure and high communication costs besides achieving high clone detection rates. Thus the researchers were inclined to detect clones in a distributed manner without involving any central authority. The distributed detection schemes are called witness node based techniques [914] that are based on framework called claimer-reporter-witness for detecting clones. In these techniques each node (claimer node) sends its ID with locations information to its one hope neighbors (reporter node). The reporter node is responsible for mapping the claimer id to one or more witness nodes. The witness nodes are responsible for taking decisions for detecting clones. Witness nodes are the foundation of witness node based techniques since they are the ones capable of making decisions for identifying and uncovering the clones and therefore they are the major point of interest for adversaries. It is therefore very essential to ensure the security of witnesses. The working of witness based schemes is demonstrated in Fig 1.

There are two major concerns with the existing witness node based techniques that can undermine the security of witness nodes; first is the selection of witness nodes i.e. the witness nodes are selected deterministically and second is the distribution of witness nodes i.e. the witness nodes are distributed non-uniformly over the network. For the ideal detection of clones with ensured security of witnesses, the witness nodes should be selected smartly that an attacker won’t be able to predict about the witness nodes. Furthermore, the distribution of witness nodes should be uniform over the entire network so as to make it difficult for an adversary to guess about witnesses. Hence, there is a need to develop a technique that claims to ensure witness node security with moderate communication and memory overheads.

Encompassing the existing attempts done so far aiming to detect clones in static WSNs, RAWL [12] seems to be the most favorable approach. This is because RAWL solves the problems of other witness node based strategies by selecting witness nodes randomly and then initiating several random walks throughout the network. Besides achieving reasonable security of witnesses RAWL has still some noteworthy defects. Firstly, RAWL trades off costs incurred for communication and memory to achieve higher probability of detecting clones and stronger security of witnesses. Secondly, RAWL ensures achieving witness node intersection by initiating more random walks with longer walk steps. Thirdly, RAWL demands more reporters for initiating random walks that can forward the location claim to randomly selected nodes which all then initiate random walks the nodes on the passing way also become the witnesses.

RAND [13, 14] is the most recent proposal for clone detection in static WSNs which endeavors to combine simple random walk with network division, thus producing much better results than RAWL. It is verified through simulations that RAND outperforms RWAL as witness node security is ensured via dividing the network into different areas. Furthermore, this results into moderate overheads in terms of memory and communication.

Both RAND and RAWL employ a simple or pure random walk strategy [15, 16] (a.k.a., “memory less” or “blind” random walk) for selecting the critical witnesses randomly. Using simple random walk mechanism the selection of next node to be visited highly depends upon the current node and since no history or records are maintained about the visited nodes. An important reason for employing random walk is due to its simplicity and low-overhead. Also utilizing random walk for selecting witness nodes to detect clones in WSNs avoids unnecessary needs of bandwidth and energy resources which the other flooding type techniques usually consume. However, SRW has some problems. Firstly, previously passed nodes are revisited frequently resulting in the higher probability that the same nodes will become the witness nodes. Consequently, nodes energy will be depleted soon and then they die since same nodes are selected again and again as witness nodes. Secondly, frequently revisiting the nodes decrease the chances of witness node intersection, that leads to a lower probability of detecting clones as well as it makes it easy for an attacker to guess about the witness nodes since the same nodes are visited again and again.

To solve the above dilemma and thwart the noteworthy shortcomings of RAND and RAWL, we are motivated to develop a detection scheme that is more efficient in detecting clones. The contributions of this work are:

  1. We propose a new kind of random walk called Single Stage Memory Random Walk and introduce a novel technique called SSRWND by combining the benefits of Single Stage Memory Random Walk with Network Division. In SSRWND when a random walk is initiated, the next node to be visited is chosen with a condition that the node should not be the node itself (current node) or the previously passed node.
  2. We perform extensive simulations, comparing the results of SSRWND with RAND, RAWL and TRAWL. The simulation results show that the communication and memory costs are reduced and high security of witness nodes is ensured with increased probability of detecting clones.

The rest of the paper is organized as follows. In Section II we summarize the most related literature. In Section III we describe the assumed network and adversary models. In Section IV, we present SSRWND in detail. In Section V we present the simulation results and in Section VI we finally conclude the paper.

Related Work

In this section, we summarize some of the most recent and most related witness node based techniques, identifying their shortcomings.

Randomized Multicast (RM) and Line-Selected Multicast (LSM) detection schemes were proposed by B.Parno et al. [9]. In RM, locations claims of claimer nodes are distributed to a set of witnesses that are selected randomly by each reporter node (one hop neighbor nodes). By exploiting Birthday Paradox [17] intersecting witness nodes are achieved that are responsible for identifying the clone detection. In LSM the nodes who forward the location claims can also server the witnesses by exploiting the network routing topology and geometric probability to find the conflicting location claims. The main problem of both RM and LSM is in probabilistic selection of the witness nodes. Moreover, LSM suffers from crowded center problem.

RED was proposed by Conti et al. [7, 8] that is comprised of two phases. The first phase is sharing a random value, rand among all the nodes through base station. The second phase is the clone detecting phase in which location claim is sent to a set of pseudo-randomly selected network locations. A powerful smart attacker can easily compromise the witnesses since witness node selection is deterministic. Also the infrastructure for distributing RED’s random seed may not always be available.

Single Deterministic Cell (SDC) and Parallel Multiple Probabilistic Cells (P-MPC) were proposed by Zhu et al. [10, 11]. In SDC and P-MPC each node Id is mapped to a geographical grid called cell. In SDC, the node ID is mapped to a single deterministic cell whereas in P-MPC, node ID is mapped to multiple deterministic cells (using geographic hash function) [18]. The location claims are broadcasted in each cell and the storing nodes become the witness nodes that revoke the clones form the network by identifying the conflicting claims. The selection of cell size is vital in both of these schemes since high communication costs are incurred on the selection of large cell and selecting a small cell size leads to effortless witness node compromise.

Random Walk (RAWL) and Table-assisted Random Walk (TRAWL) were proposed by Y. Zeng et al. [12]. In RAWL SRW is used to select witnesses which can revoke the replicated nodes form the network upon receiving the conflicting claims. TRAWL follows the same detection procedure as RAWL but memory costs are reduced by using trace table at each node. For achieving higher detection probability RAWL and TRAWL need more random walks with longer walk steps, leading to higher communication and memory costs as compared to LSM. Fig 2 demonstrates the working of RAWL and TRAWL.

RAND [13, 14] combines SRW with network division and performs two steps, the network configuration step divides the entire network into hierarchical levels, formulating one or more levels a specific area. In the replica detection step, reporters initiate SRWs in each randomly selected area to selection of witnesses. Each pass node by random walk will become a witness node and store the location claim. The network division helps to reduce the communication and memory costs ensure the high security of witness nodes. The working of RAND can be illustrated by using Fig 3.

thumbnail
Fig 3. Assignment of Levels and Areas during Network Division [13, 14]

https://doi.org/10.1371/journal.pone.0158072.g003

The contribution in [19] are reviewed and after further investigating the SSRWND protocol by theoretically analyzing the network division and selection of areas mechanism, the expected return time of random walk, security analysis and efficiency analysis are presented in this paper. The further simulations prove that SSRWND outperforms the previous schemes in-terms of high security of witnesses and detection probability with moderate overheads. Details of other more recent replica detection and authentication schemes can be found in [2036].

Requirements for Claimer-Reporter-Witness Node Based Schemes

Claimer Reporter Witness (CRW) based (or witness node based) Schemes are considered to be the most efficient techniques so far. However, they also have several limitations. They lack some vital requirements which should be taken into account while designing distributed witness node based techniques. In CRW-based schemes, witness nodes (intersecting witnesses) are an important element as these witnesses detect and revoke the clones. Thus, the basic requirements for designing CRW-based techniques are about the random selection, security and uniform distribution of these witnesses.

In this section, we describe these essential requirements for distributed claimer reporter witness node based schemes which should be fulfilled to make clone detection more effective and robust.

  1. Witness Selection: Most importantly witnesses should be selected non-deterministically with equal probability of being witnesses. With deterministic witness selection, smart attack can be launched by an attacker who greedily chooses witnesses.
  2. Witness Distribution: The second requirement is the distribution of witness nodes. The witness nodes should be distributed uniformly throughout the network
  3. Witness Security: The security of witnesses can be easily compromised in deterministic schemes due to small number of witnesses and can be under the control of an attacker during the lifetime of the network. When witnesses are selected non-deterministically an attackers is unable to judge about the critical witnesses. The security of witnesses can be safeguarded by making the scheme both ID and area oblivious (No information of ID and Location) and by giving each node an equal probability of being witnesses regardless of its geographic location respectively. The detection probability of clones can be higher by certifying the security of critical witnesses.
  4. Overheads: Designing protocols with lower overhead is challenging dueto the resource constrains. Energy drain of the nodes will affect the functionality the whole and if only few nodes experience high memory demand, then these nodes will start dropping packet as result of memory overflow. Developing protocols with moderate overheads and higher detection probability is very important.

Network and Adversary Model

A large number of uniformly distributed static low cost sensor nodes knowing their location are assumed. Each node knows its geographic location by using localization schemes. Nodes are stationary each having a unique ID with a pair of identity based public and private keys and remains static until end of each protocol execution. Attackers cannot create new IDs for their replicas as nodes are protected by pair wise keys similar to [79, 1214]. New nodes can replace the old or dead nodes into the network [10, 11] that need to forward their location claim to their one hop neighbors.

Adversaries are assumed to be simple but powerful that can deploy clones (deliberately) in the network created by capturing and compromising sensors. An adversary is assumed to be capable of capturing and compromising only a limited number of nodes. SWATT [37] can be employed if unlimited sensor nodes are compromised by the adversary.

SSRWND

To describe the proposed distributed protocol SSRWND we resort claimer-reporter-witness framework. SSRWND works in the same manner as [13, 14] with the difference of employing a new kind of random walk termed as single stage memory random walk for the selection of witnesses. SSRWND combines network division with this new kind of random walk which in result not only achieves high detection probability but the overheads are also reduced as compared to RAND and RAWL. We identify that by employing Simple Random Walk in RAND, the selection of the next node at random leads to frequent revisiting of nodes that results in long delays and higher energy consumption. To avoid this problem, we propose SSRWND which selects unvisited neighbors and thus accelerates the detection process.

SSRWND performs two steps; network division and replica/clone detection. Network division starts by the tagging process in which different hierarchical levels are formed by entire network division, formulating a specific area with one or more levels. With respect to a particular sink, levels are then assigned to all the nodes, each node belonging to a certain level and area. Distance to the assigned sink constitutes a level and according to the sink configuration, different number of levels comprises each area. The network division (in levels & areas) takes inspiration from [38] where the detailed process is described. During the network division the levels and areas are assigned to nodes as shown in Fig 3.

In the beginning of replica/clone detection a signed location claim is broadcasted by each node (claimer node) to its neighbors, where || indicating the concatenation operation and loca the location information of node a. The verification of the signature along with the plausible location of a claimer is done by each reporter upon receiving the claim. With some probability, the neighboring nodes serve as the reporters of that claimer that only forward the location claim to randomly selected nodes.

Each reporter first randomly selects area(s) through the proposed area selection mechanism (that defines how many areas reporter should select from the total number of areas) and then forwards in those randomly selected areas the location claim to randomly selected nodes depending upon the number of areas the entire network is divided into. Using Eq (1), the reporters will randomly select areas when the network is divided into odd number of areas (> = 3). Likewise using Eq (2), the reporters will randomly select areas when the network is divided into even number of areas (> = 4). (1) (2) Where As indicates the areas to select and At represents the entire network division into total number of areas. Using Eq (3) the total number of possible combinations can be calculated for any number of areas that are unordered and without replacement.

(3)

After the selection of number of areas, any one possible combination of areas is randomly selected by the reporters (using Eq (3)) in order to forward the location claim. From any areas of the network the reporters follow the above method for selecting any combination of areas, resulting to achieve at-least one intersecting area. The network division into odd number of areas results in at least one intersecting area whereas the network division into even number of areas results in at least two intersecting areas.

In each randomly selected area, the claim is forwarded to g locations by the reporter with some probability through randomly selected single node (geographic location is selected by using GPRS [39]). It is noticed in [7, 8, 12] that a random location is a better secure choice than a node id). Fig 4 shows the working and witness node selection of RAND.

On receiving the location claim each randomly selected node in each area verifies the signature, stores that claim and becomes the witness of that claimer. Then this first witness starts r single stage memory random walks of t steps in each randomly selected area, every passing node also becoming the witnesses. Single stage memory or conditional random walk choses the next node to be visited if the following condition is satisfied; “the node should not be the current node or previously passed node”, i.e. the location claim is forwarded to the next selected node only if at walk step t + 1, the node should neither be the node (previous one) at walk step t– 1 nor the node (current one) at random walk step t.

The next node can be chosen by using another way which checks for the least visited node or the node that has maximum energy resources and buffer capacity (memory) [38, 40]. The least visited node is favorable in a case when the random walk reaches such a node whose all neighbors are already visited before and still the random walk steps are left. In the latter case, the network lifetime increases by evenly and uniformly utilizing the energy and buffer resources of sensor nodes. Hence the next randomly selected node is selected by each node following the above procedure and each node continues doing this until the length of random walk. On finding a conflict (two different location claims with same node ID), witness node broadcasts the two conflicting claims and revokes the replicas. Having the conflicting claims as evidence, the signatures are verified and links with replicas are terminated by every node. Fig 5 shows the pseudo code for next neighbor selection method in the proposed SSRWND protocol.

thumbnail
Fig 5. Pseudo-code for next neighbor selection in SSRWND.

https://doi.org/10.1371/journal.pone.0158072.g005

Analysis of SSRWND

This section presents the theoretical discussion about the security and efficiency of SSRWND.

Analysis of Network Division and Area Selection Mechanism.

Network configuration step divides the entire network into areas, assigning a particular area to each node. Supposing the network division into (At) number of areas (e.g. A1, A2, A3, A4……n), and assuming the minimum number of areas to be At = 3, the network division depends upon many factors including the security of witnesses, size of the network and an area, and overall communication cost. The division of the network into minimum number of 2 areas is not feasible since through area selection mechanism both of the areas will be selected thus making it easy for an adversary to discover and identify the critical witnesses, thus, compromising the whole area with little effort for sheltering and evading detection. When the network is divided into At ≥ 3 areas, the reporters have opportunities to select different combinations of areas in more than one ways, hence predicting about reporters selection of areas (in turn about the witnesses) becomes tough for adversaries. Therefore, witnesses will be more secured with network division into minimum of At ≥ 3 areas.

Since the area size is a significant factor, it is mandatory to investigate about the network division into possible smallest and largest sized areas, so as to gain higher security of witnesses. The size of an area is also by influences the total number of nodes. We can calculate the approximate size of each area (single selected area (Sa)) when the total number of nodes in network (Nn) are divided by the total number of areas in the network (At). It can be expressed by the formula in Eq (4).

(4)

The network division into three areas is shown in Fig 3. In the beginning of the detection process location claim is first sent to the neighbors by a claimer node and with some probability the location claim is then forwarded to randomly selected nodes by the neighbors that are located at different areas. The proposed area selection mechanism is used by every reporter for randomly selecting area(s) which defines that how many areas reporter should select from the total number of areas, depending upon the number of areas the entire network is divided into. With network division into odd number of areas (> = 3), the reporters will randomly select areas Using Eq (1). Likewise with network division into even number of areas (> = 4), the reporters will randomly select areas using Eq (2). Generally area selection can be performed using Eq (5).

(5)

The possible combinations for any number of areas are unordered and without replacement. A number of different areas (As) can be selected by every reporter out of the total areas (At) in a number of ways as . Eq (3) can be used to calculate the total number of possible combinations.

The clone detection schemes based on witness nodes are highly dependent upon the way the witnesses are selected since the norms for witness selection insure the protection and security of critical witnesses through proper witness distribution, in turn increasing the detection probability of clones. Witness node based mechanisms aim to shield the witnesses so that a skilled and clever adversary remain incapable to compromise them. Aiming to achieve this much potential we propose that the network division into areas is combined with single stage memory random walk with the provision of an effective area selection mechanism to select witnesses. This concept provides uniform witness distribution in the whole network with the added security to handle smarter attackers.

The Expected Return Time of Random Walk.

In this section different ways are explored to find out the expected return time of random walk to its already passed node (previously passed node). If there is only one random walk initiated in the network, the return time (Ri) for random walk can be approximated as , where t →∞) for infinite grid [41]. In case of finite grid and smaller random walk steps (t) the expected return time of a random walk can be calculated using following equation [42]: (6) Where L0,0(t) is the total number of valid paths that returns to 0 in t steps and 4t is the total number of possible paths of t steps.

Security Analysis.

SSRWND fulfills the optimal requirements of witness node based schemes (presented in section III). To perform the security analysis, we analyze the resiliency of SSRWND against smart attacker whose aim is to compromise the critical witness nodes (i.e., nodes that are responsible for the detection and revocation of clones). It is important to note that for non-deterministic and randomized protocols, any smart adversary needs to wait for the execution of the protocol and the clones he/she deployed in the network must become the part of the detection process by following the protocol execution.

For the additional security of witnesses, SSRWND leverages the network division into areas and in randomly selected areas initiation of random walks. Any area can be selected with equal probability by any reporter (i.e., 1/At). First a random node is selected in these randomly selected areas and in each area that node will further select some random nodes for initiating (r) random walks, the passing nodes become the witnesses. Consequently, a skillful attacker will be impotent in finding out the critical witnesses before the protocol execution. In addition to that, the security of witnesses is guaranteed through non-deterministic and random selection of witnesses such that there will be an equal probability of each node to become a witness node without involving a base station or cluster head. As a result, it is probably very challenging for an expert adversary to guess about the witnesses.

Smarter adversaries that are aiming to locate and neutralize the crucial witnesses can be able to learn about the randomly selected areas and then in each area further determining the randomly selected starting node. In this way adversaries that are scanning and compromising all the current witness node’s neighbors can reach to the next witness and then keep on compromising the passing witnesses for t random walk steps for t times.

For a particular node, an adversary needs to compromise the total number of nodes as which an adversary is inept to do so (assuming that only a limited number of nodes can be compromised by an adversary).

Possibly an attacker is able to compromise an intermediate node of a random walk. In such a case, an attacker even cannot guess about next witnesses since he/she needs to scan all the d neighbors of the current node in order to find out the next witness node. However, an attacker can try to back-track the previously passed nodes which cannot help the attacker since each node deletes its history (previous node information) after forwarding the location claim to its next node.

Efficiency Analysis.

To evaluate the efficiency of SSRWND, we have used three metrics, probability of detection, communication and memory cost. These metrics are chosen according to the nature of WSNs as these sensors have limited resources in terms of memory and energy. Memory and Communication costs are one of factors to be considered because they might affect life time of the WSNs as they are resource constrained. On the other hand high detection probability with moderate overheads is main objective of any detection scheme.

  1. I. Probability of Detection: The most important performance metric for clone detection schemes is the probability of successful detection as it is the primary security requirement of any detection scheme to detect the attack occurrence with high probability. Detection probability is defined as the total number of successful detections of clone nodes during each detection round divided by total protocol runs. The probability of replica/ clone detection is calculated by following formula.
    (7)

The detection probability of RAWL, TRAWL, RAND and SSRWND is closely related to the number of random walk steps, since the increased number of walk steps result into higher detection probability. The reason is that: more walk steps increase the chances of intersections among the random walk steps (number of common nodes). As discussed earlier SSRWND overcomes the natural problem of simple random walk of revisiting of already passed node which in result allows the random walk to visit unpassed nodes, consequently increasing the chances of intersection.

  1. II. Communication Cost: The most crucial performance metric for sensor network protocols is the Communication cost since communication in WSNs uses more energy than other operations [43]. Communication cost is defined as the average number of location claim packets that are sent and received by each node during the detection round. The clone detection probability is raised by increasing the number of random walks and walk steps but correspondingly the communication costs are also increased. Comparing to RAWL, TRAWL and RAND, SSRWND requires less number of random walks and walk steps.
  2. III. Memory Cost: Memory cost is another important performance metric. Since low cost sensor nodes resource constrained and thus the techniques which require more storage are considered to be impractical. Memory cost is defined as the average number of location claims that are stored by each node in the areas. More walk steps mean more nods to store the location claims, SSRWND require less walk steps as compare to RAND, RAWL and TRAWL which in turn need less nodes to store the locations claims.

Simulation Results

SSRWND, RAND, RAWL, and TRAWL are evaluated by comparing their performance in probability of clone detection, communication and memory costs incurred. For a reasonable assessment and simplify the comparison, similar simulation methodology is applied as used in [14]. In 160 x 160 square grid areas, 1024 nodes are deployed. The communication range of each node is set to 5m and each node in the network normally has degree, d = 4. In Table 1, the settings and parameters which were considered for simulations are shown.

For each random walk, the simulations are run for 10,000 times randomly and exclusively by dividing the network into different number of areas (e.g. 3, 4 & 5). During simulations, higher probability of detecting clones achieved by RAWL and TRAWL though initiating more long random walks is noticed. In RAND and SSRWND, the network can be divided into any number of small areas. In our experiments, the network is divided into three areas (minimum). This is because, on the division of the network into two areas, the reporters have to randomly select nodes form both the areas (according to Eq (2) of area selection), thus, the intended security cannot be achieved. However, minimum number of three areas will form an additional layer of security, making it difficult for an adversary to guess about which areas are selected for forwarding the location claim. The total communication and memory costs will increase with the division of the network into larger number of areas.

Detection Probability

This subsection analyzes the probability of clone detection for RAWL, TRAWL, RAND and SSRWND by scrutinizing the intersecting witness nodes. Theoretically as well as through simulations we observed that at-least one intersecting area is enough for higher probability of detection and security of witness nodes and successful clone detection requires a single intersecting witness node.

It is shown in Figs 6 and 7 that the detection probability of SSRWND, RAND, RAWL and TRAWL becomes higher with the increase in walk steps incurring higher communication and memory overheads while setting the number of random walks as 3 and 4 respectively for SSRWND, RAND, RAWL and TRAWL. The network is divided into 3 and 5 areas in case of both RAND and SSRWND for the calculation of required walk steps. So, it is verified through simulations that to achieve similar detection probability, random walk steps needed for SSRWND are less in comparison to RAND, RAWL and TRAWL.

thumbnail
Fig 6. Detection Probability vs. walks step (r = 3 & # areas = 3 & 5)

https://doi.org/10.1371/journal.pone.0158072.g006

thumbnail
Fig 7. Detection Probability vs. walks step (r = 4 & # areas = 3 & 5).

https://doi.org/10.1371/journal.pone.0158072.g007

Communication & Memory Overhead

In WSNs, communication requires more energy than other operations [43]. More number of random walks and walk steps increase the communication and memory costs. RAWL and TRAWL incur twice the communication cost of LSM so as to achieve 95% detection probability and thus trading higher communication overhead for stronger security. RAND, SSRWND, RAWL and TRAWL involve two kinds of communication costs that are incurred for detection method. Cost incurred when the location claim is forwarded to the randomly selected nodes from the reporters. And the other cost incurred is when random walks are initiated till the end of all random walk steps by randomly selected nodes. So, the total communication cost incurred is the sum of these two costs.

Communication costs of RAWL and TRAWL are of two types, first, when the location claim is forwarded between reporters and randomly selected nodes. And second when random walks are initiated by randomly selected nodes. In case of SSRWND and RAND, the communication costs involved are the costs incurred when a single random node is selected by the reporters in each area. The further cost incurred is when r random walks are initiated by each randomly selected node that is selected by the reporter in each area. When two randomly selected nodes are deployed randomly (on a unit square) the average distance between them is approximately equal to [9].

Figs 8, 9, 10 and 11 show the communication overheads of SSRWND, RAND, RAWL, and TRAWL while setting the value of r (random walk) as 3 and 4. In case of SSRWND and RAND the number of areas is set to be 3 and 5. The results show that in order to achieve 95% detection probability SSRWND incurs lower communication costs than RAND, RAWL and TRAWL.

thumbnail
Fig 8. Detection Probability vs. Avg. Bytes Sent (r = 3 & # areas = 3)

https://doi.org/10.1371/journal.pone.0158072.g008

thumbnail
Fig 9. Detection Probability vs Avg Bytes Sent (r = 3 & # areas = 5)

https://doi.org/10.1371/journal.pone.0158072.g009

thumbnail
Fig 10. Detection Probability vs. Avg. Bytes Sent (r = 4 & # areas = 3)

https://doi.org/10.1371/journal.pone.0158072.g010

thumbnail
Fig 11. Detection Probability vs, Avg, Bytes Sent (r = 4 & # areas = 5)

https://doi.org/10.1371/journal.pone.0158072.g011

Similarly Figs 12, 13. 14 and 15 show the memory overheads for SSRWND, RAND, RAWL and TRAWL. Fig 12 demonstrates that for achieving 95% detection probability, SSRWND requires 61% and 38% less memory than RAWL & RAND respectively when r = 3 and areas = 3.

thumbnail
Fig 12. Detection Probability vs. Avg. Bytes Stored (r = 3 & # areas = 3)

https://doi.org/10.1371/journal.pone.0158072.g012

thumbnail
Fig 13. Detection Probability vs. Avg. Bytes Stored (r = 3 & # areas = 5)

https://doi.org/10.1371/journal.pone.0158072.g013

thumbnail
Fig 14. Detection Probability vs. Avg. Bytes Stored (r = 4 & # areas = 3)

https://doi.org/10.1371/journal.pone.0158072.g014

thumbnail
Fig 15. Detection Probability vs. Avg. Bytes Stored (r = 4 & # areas = 5)

https://doi.org/10.1371/journal.pone.0158072.g015

Fig 13 demonstrates that SSRWND requires 72% and 39% less memory than RAWL and RAND respectively when r = 3 and areas = 5. In Fig 14 when r = 4 and areas = 3, SSRWND requires 62% and 35% less memory than RAWL & RAND respectively, and in Fig 15 when r = 4 and areas = 5, SSRWND requires 71% and 33% less memory then RAWL & RAND respectively. TRAWL consumes less memory than RAWL, RAND and SSRWND because it uses trace table at each node for recording the traces of random walks. The results show a minimal difference between memory overheads of SSRWND and TRAWL.

Discussion

The communication and memory cost calculations for SSRWND, RAND, RAWL and TRAWL are shown in Table 2 in order to achieve 95% detection probability while setting r = 3, 4, 5 and 6 for each of 3, 4 and 5 areas in the case of SSRWND and RAND. The location claim is assumed to be 46 bytes (2 bytes for ID, 4 bytes for location and 40 bytes for signature, e.g. ECDSA [44]) for calculating the memory overhead of SSRWND, RAND, RAWL and TRAWL. The results convey that communication and memory overheads introduced by SSRWND are much lower than RAND, RAWL and TRAWL. SSRWND is also more resistant to smart and powerful adversaries than RAWL and TRAWL. In RAWL and TRAWL an adversary can be so strong that he/she can discover the whole paths of random walks by monitoring and analyzing network traffic globally. But, in case of SSRWND parallel random walks are initiated in different areas of the network which create a high level of difficulty for an adversary to find out the critical witness nodes as compared to RAWL and TRAWL.

thumbnail
Table 2. Costs incurred for Communication and Memory in achieving 95% Detection Probability.

https://doi.org/10.1371/journal.pone.0158072.t002

Conclusion

The clone detection protocols like RAND and RAWL employ SRW which revisits the already passed nodes naturally, which reduces witness node intersection and detection probability. Focusing on the problem of node revisiting, this paper presents a distributed technique called Single Stage Memory Random Walk with Network Division (SSRWND) that improves the RAND protocol by merging constrained memory random walk with network division. SSRWND achieves much better results than RAND, RAWL and TRAWL because it employs random walk with memory in which the last visited node is kept in a record so as to decrease the node revisits. SSRWND attains greater witness node security with higher probability of detecting clones and moderate overheads (communication & memory). Some of the applications of SSRWND include security oriented application fields of WSNs like military and medical etc. In future we aim to perform the scalability analysis of our proposed protocol.

Acknowledgments

The authors wish to thanks the anonymous reviewers for their valuable comments for the improvement of this manuscript. The authors wish to acknowledge the support and help of Deanship of Scientific Research at Jazan University and the authors also extend their sincere appreciations to Deanship of Scientific Research at King Saud University for its funding this Prolific Research Group (PRG-1436-16).

Author Contributions

Conceived and designed the experiments: WZK MYA NMS. Performed the experiments: WZK MYA NMS. Analyzed the data: MSH MA MKK. Contributed reagents/materials/analysis tools: MSH MA MKK. Wrote the paper: WZK MSH.

References

  1. 1. Akyildiz I. F., Su W., Sankarasubramaniam Y., & Cayirci E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393–422.
  2. 2. Khan W. Z., Xiang Y., Aalsalem M. Y., & Arshad Q. (2013). Mobile phone sensing systems: A survey. Communications Surveys & Tutorials, IEEE, 15(1), 402–427.
  3. 3. Karlof C., & Wagner D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293–315.
  4. 4. Wood A, Stankovic J. Denial of Service in Sensor Networks. IEEE Computer. 2002 October; 3(10):54–62.
  5. 5. Choi, H., Zhu, S., & La Porta, T. F. (2007, September). SET: Detecting node clones in sensor networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on (pp. 341–350). IEEE.
  6. 6. Brooks R., Govindaraju P. Y., Pirretti M., Vijaykrishnan N., & Kandemir M. T. (2007). On the detection of clones in sensor networks using random key predistribution. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 37(6), 1246–1258.
  7. 7. Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2007, September). A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 80–89). ACM.
  8. 8. Conti M., Di Pietro R., Mancini L. V., & Mei A. (2011). Distributed detection of clone attacks in wireless sensor networks. Dependable and Secure Computing, IEEE Transactions on, 8(5), 685–698.
  9. 9. Parno, B., Perrig, A., & Gligor, V. (2005, May). Distributed detection of node replication attacks in sensor networks. In Security and Privacy, 2005 IEEE Symposium on (pp. 49–63). IEEE.
  10. 10. Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., & Roy, S. (2007, December). Efficient distributed detection of node replication attacks in sensor networks. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual (pp. 257–267). IEEE.
  11. 11. Zhu B., Setia S., Jajodia S., Roy S., & Wang L. (2010). Localized multicast: efficient and distributed replica detection in large-scale sensor networks. Mobile Computing, IEEE Transactions on, 9(7), 913–926.
  12. 12. Zeng Y., Cao J., Zhang S., Guo S., & Xie L. (2010). Random-walk based approach to detect clone attacks in wireless sensor networks. Selected Areas in Communications, IEEE Journal on, 28(5), 677–691.
  13. 13. Khan, W. Z., Aalsalem, M. Y., Saad, N. M., Xaing, Y., & Luan, T. H. (2014, April). Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. In Wireless Communications and Networking Conference (WCNC), 2014 IEEE (pp. 2623–2628). IEEE.
  14. 14. Khan W. Z., Aalsalem M. Y., & Saad N. M. (2015). Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division. PloS one, 10(5), e0123069. pmid:25992913
  15. 15. Avin C., & Krishnamachari B. (2008). The power of choice in random walks: an empirical study. Computer Networks, 52(1), 44–60.
  16. 16. Angelopoulos, C. M., Nikoletseas, S., Patroump, D., & Rapropoulos, C. (2011, October). A new random walk for efficient data collection in sensor networks. In Proceedings of the 9th ACM international symposium on Mobility management and wireless access (pp. 53–60). ACM.
  17. 17. Menezes A. J., Van Oorschot P. C., & Vanstone S. A. (1996). Handbook of applied cryptography. CRC press.
  18. 18. Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R., & Shenker, S. (2002, September). GHT: a geographic hash table for data-centric storage. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (pp. 78–87). ACM.
  19. 19. Khan, W. Z., Saad, N. M., Aalsalem, M. Y., & Xaing, Y. (2014, November). Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division. In Circuits and Systems (APCCAS), 2014 IEEE Asia Pacific Conference on (pp. 559–562). IEEE.
  20. 20. Seo W. J., Islam R., Khan M. K., & Choo K. K. R. (2015). A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. In Security and Privacy in Communication Networks (pp. 649–664). Springer International Publishing.
  21. 21. Khan W. Z., Aalsalem M. Y., Saad M. N. B. M., & Xiang Y. (2013). Detection and mitigation of node replication attacks in wireless sensor networks: a survey. International Journal of Distributed Sensor Networks, 2013, Article ID 149023, 22 pages, 2013.
  22. 22. Zhu W. T., Zhou J., Deng R. H., & Bao F. (2012). Detecting node replication attacks in wireless sensor networks: a survey. Journal of Network and Computer Applications, 35(3), 1022–1034.
  23. 23. Khan W. Z., Saad M. N. B. M., & Aalsalem M. Y. (2013). Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks. International Journal of Grid and Utility Computing, 4(2), 119–127.
  24. 24. Gao, Y., Zeng, P., & Choo, K. K. R. (2014, November). Multi-sender Broadcast Authentication in Wireless Sensor Networks. In Computational Intelligence and Security (CIS), 2014 Tenth International Conference on (pp. 633–637). IEEE.
  25. 25. Jiang Qi, Ma Jianfeng, Lu Xiang, and Tian Youliang. "An efficient two-factor user authentication scheme with unlink ability for wireless sensor networks." Peer-to-Peer Networking and Applications 8, no. 6 (2015): 1070–1081.
  26. 26. Jiang Qi, Ma Jianfeng, Li Guangsong, and Yang Li. "An efficient ticket based authentication protocol with unlink ability for wireless access networks." Wireless personal communications 77, no. 2 (2014): 1489–1506.
  27. 27. Shen J., Tan H., Moh S., Chung I., Liu Q., & Sun X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Communications and Networks, Journal of, 17(5), 453–462.
  28. 28. Kenaza T., Hamoud O. N., & Nouali‐Taboudjemat N. (2015). Efficient centralized approach to prevent from replication attack in wireless sensor networks. Security and Communication Networks, 8(2), 220–231.
  29. 29. Conti M., Di Pietro R., & Spognardi A. (2014). Clone wars: Distributed detection of clone attacks in mobile WSNs. Journal of Computer and System Sciences, 80(3), 654–669.
  30. 30. Zhou Y., Huang Z., Wang J., Huang R., & Yu D. (2014). An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1–12.
  31. 31. Khan W. Z., Hossain M. S., Aalsalem M. Y., Saad N. M., & Atiquzzaman M. (2016). A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs. Journal of Network and Computer Applications, 63, 68–85.
  32. 32. Ge M., Choo K. K. R., Wu H., & Yu Y. (2016). Survey on key revocation mechanisms in wireless sensor networks. Journal of Network and Computer Applications, 63, 24–38.
  33. 33. Nam J, Choo K-KR, Han S, Kim M, Paik J, Won D (2015) Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLoS ONE 10(4): e0116709. pmid:25849359
  34. 34. Ge M., & Choo K. K. R. (2014). A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks (pp. 462–475). Springer International Publishing.
  35. 35. Zeng P., Choo K. K. R., & Sun D. Z. (2010). On the security of an enhanced novel access control protocol for wireless sensor networks. Consumer Electronics, IEEE Transactions on, 56(2), 566–569.
  36. 36. Zeng P., Cao Z., Choo K. K. R., & Wang S. (2009). Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters, 13(6), 426–428.
  37. 37. Seshadri, A., Perrig, A., Van Doorn, L., & Khosla, P. (2004, May). SWATT: Software-based attestation for embedded devices. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (pp. 272–282). IEEE.
  38. 38. Aalsalem, M. Y., Taheri, J., & Zomaya, A. Y. (2010, May). A framework for real time communication in sensor networks. In Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference on (pp. 1–7). IEEE.
  39. 39. Karp, B., & Kung, H. T. (2000, August). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM.
  40. 40. Zuniga M., Avin C., & Hauswirth M. (2010). Querying dynamic wireless sensor networks with non-revisiting random walks. In Wireless Sensor Networks (pp. 49–64). Springer Berlin Heidelberg.
  41. 41. Spitzer F. (2013). Principles of random walk (Vol. 34). Springer Science & Business Media.
  42. 42. Shah R. C., Roy S., Jain S., & Brunette W. (2003). Data mules: Modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Networks, 1(2), 215–233.
  43. 43. Estrin, D., Govindan, R., Heidemann, J., & Kumar, S. (1999, August). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking (pp. 263–270). ACM.
  44. 44. Liu, A., & Ning, P. (2008, April). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on (pp. 245–256). IEEE.