Abstract | ||
---|---|---|
By launching the node replication attack ,t he ad- versary can place the replicas of captured sensor nodes back into the sensor networks in order to eavesdrop the transmit- ted messages or compromise the functionality of the network. Although defending against node replication attacks demands immediate attention, only a few solutions were proposed. Most of the existing distributed protocols adopt the witness finding strategy, which selects a set of sensor nodes somewhere as the witnesses, to detect the replicas. However, the energy consumption of the witness finding strategy is remarkably high and even gets worse in mobile networks. In addition, the location information is necessary for each node if the witness finding strategy is applied. In this paper, a novel protocol, called eXtremely Efficient Detection (XED), is proposed to resist against node replication attacks in mobile sensor networks. The advantages of XED include (1) only constant communication cost is required for replica detection; (2) the location information of sensor nodes is not required. Performance analyses and comparison with known methods are provided to demonstrate the effectiveness of our protocol. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/SAHCN.2008.82 | SECON |
Keywords | Field | DocType |
security,sensor network,information science,protocols,wireless sensor networks,hardware,intrusion detection,mobile communication,resists,simulation,cloning,mobile network,mobile computing,probability | Mobile computing,Key distribution in wireless sensor networks,Mobile radio,Replica,Computer science,Computer network,Wireless sensor network,Energy consumption,Intrusion detection system,Mobile telephony,Distributed computing | Conference |
Citations | PageRank | References |
29 | 1.04 | 5 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chia-Mu Yu | 1 | 242 | 29.59 |
Chun-shien Lu | 2 | 1238 | 104.71 |
Sy-Yen Kuo | 3 | 2304 | 245.46 |