TY - JOUR
T1 - NISA
T2 - Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks
AU - Huan, Xintao
AU - Kim, Kyeong Soo
AU - Zhang, Junqing
N1 - Publisher Copyright:
© 1972-2012 IEEE.
PY - 2021/7
Y1 - 2021/7
N2 - Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensor networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broadcasting. To defend against Spoofing attacks, we propose a new node identification scheme called node identification against Spoofing attack (NISA). It utilizes the reverse time synchronization framework, where sensor nodes' clock skews are estimated at the head of a WSN, and the spatially-correlated radio link information to achieve simultaneous node identification and attack detection. We further provide centralized and distributed NISA for covering both single-hop and multi-hop scenarios, the former of which employs a single-input and multiple-output convolutional neural network. With a real WSN testbed consisting of TelosB sensor nodes running TinyOS, we investigate the identifiability of clock skews under temperature and voltage variations and evaluate the performance of both centralized and distributed NISA. Experimental results demonstrate that both centralized and distributed NISA could provide accurate node identification and Spoofing attack detection.
AB - Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensor networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broadcasting. To defend against Spoofing attacks, we propose a new node identification scheme called node identification against Spoofing attack (NISA). It utilizes the reverse time synchronization framework, where sensor nodes' clock skews are estimated at the head of a WSN, and the spatially-correlated radio link information to achieve simultaneous node identification and attack detection. We further provide centralized and distributed NISA for covering both single-hop and multi-hop scenarios, the former of which employs a single-input and multiple-output convolutional neural network. With a real WSN testbed consisting of TelosB sensor nodes running TinyOS, we investigate the identifiability of clock skews under temperature and voltage variations and evaluate the performance of both centralized and distributed NISA. Experimental results demonstrate that both centralized and distributed NISA could provide accurate node identification and Spoofing attack detection.
KW - Node identification
KW - clock skew
KW - convolutional neural network
KW - link quality indicator
KW - received signal strength
KW - spoofing attack
KW - wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=85103907259&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2021.3071448
DO - 10.1109/TCOMM.2021.3071448
M3 - Article
AN - SCOPUS:85103907259
SN - 0090-6778
VL - 69
SP - 4691
EP - 4703
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 7
M1 - 9398669
ER -