NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks

Xintao Huan, Kyeong Soo Kim*, Junqing Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

19 Citations (Scopus)

Abstract

Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensor networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broadcasting. To defend against Spoofing attacks, we propose a new node identification scheme called node identification against Spoofing attack (NISA). It utilizes the reverse time synchronization framework, where sensor nodes' clock skews are estimated at the head of a WSN, and the spatially-correlated radio link information to achieve simultaneous node identification and attack detection. We further provide centralized and distributed NISA for covering both single-hop and multi-hop scenarios, the former of which employs a single-input and multiple-output convolutional neural network. With a real WSN testbed consisting of TelosB sensor nodes running TinyOS, we investigate the identifiability of clock skews under temperature and voltage variations and evaluate the performance of both centralized and distributed NISA. Experimental results demonstrate that both centralized and distributed NISA could provide accurate node identification and Spoofing attack detection.

Original languageEnglish
Article number9398669
Pages (from-to)4691-4703
Number of pages13
JournalIEEE Transactions on Communications
Volume69
Issue number7
DOIs
Publication statusPublished - Jul 2021

Keywords

  • Node identification
  • clock skew
  • convolutional neural network
  • link quality indicator
  • received signal strength
  • spoofing attack
  • wireless sensor network

Fingerprint

Dive into the research topics of 'NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this