Weinan Liu , Jiawen Shi , Hong Wang , Tingting Chen , Zhaoyang Han , Qingqing Li
{"title":"Coordinate plane based authentication method for detecting clone node in wireless sensor networks","authors":"Weinan Liu , Jiawen Shi , Hong Wang , Tingting Chen , Zhaoyang Han , Qingqing Li","doi":"10.1016/j.jisa.2025.104148","DOIUrl":null,"url":null,"abstract":"<div><div>Nowadays, wireless sensor networks (WSNs) have become a very promising technology for automatic data collection in many applications. Due to the feature of limited resource, WSNs are more vulnerable to certain attacks, such as node clone attacks. An adversary can clone a valid member sensor node and place the new clone node within the group to collect information in the group. The clone node has the same information as the cloned one, and can act as if it were the cloned one to obtain the group key, leading to leakage of group communication data. The current solutions have drawbacks; for instance, schemes based on IDS require additional component support. In this paper, a novel authentication scheme is proposed to address node clone attacks, utilizing a coordinate plane instead of geographical locations. This scheme also possesses additional functionalities, effectively managing node additions and revocations while incorporating collusion attack detection. Through theoretical analysis, the detection rate of our scheme is approximately 99.5%. Experimental simulations demonstrate that the practical detection rate of our scheme is 98.4%, which is lower than the theoretical maximum rate but is higher than that of many recent works and does not rely on additional mechanisms such as trust or hierarchical structures. Furthermore, through multiple rounds of detection, the overall detection rate can be further improved, and collusion attacks can be effectively identified.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104148"},"PeriodicalIF":3.7000,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001851","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, wireless sensor networks (WSNs) have become a very promising technology for automatic data collection in many applications. Due to the feature of limited resource, WSNs are more vulnerable to certain attacks, such as node clone attacks. An adversary can clone a valid member sensor node and place the new clone node within the group to collect information in the group. The clone node has the same information as the cloned one, and can act as if it were the cloned one to obtain the group key, leading to leakage of group communication data. The current solutions have drawbacks; for instance, schemes based on IDS require additional component support. In this paper, a novel authentication scheme is proposed to address node clone attacks, utilizing a coordinate plane instead of geographical locations. This scheme also possesses additional functionalities, effectively managing node additions and revocations while incorporating collusion attack detection. Through theoretical analysis, the detection rate of our scheme is approximately 99.5%. Experimental simulations demonstrate that the practical detection rate of our scheme is 98.4%, which is lower than the theoretical maximum rate but is higher than that of many recent works and does not rely on additional mechanisms such as trust or hierarchical structures. Furthermore, through multiple rounds of detection, the overall detection rate can be further improved, and collusion attacks can be effectively identified.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.