2015
DOI: 10.1002/dac.3097
|View full text |Cite
|
Sign up to set email alerts
|

A low‐cost node capture attack algorithm for wireless sensor networks

Abstract: SUMMARYWireless sensor networks (WSNs) have many micro devices that are easy to capture. In node capture attacks, the adversary physically captures sensors and extracts all information including key information from their memories, trying to compromise the system's security protection. However, the robust and random nature of many WSN security designs makes it difficult to compromise the system even with the capture of some sensors. In this paper, we approach WSN security from an adversarial point of view and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 35 publications
0
14
0
Order By: Relevance
“…Several attack models have been designed for WSN that exploits different vulnerabilities present in the network. The attacking models are based on several approaches namely UML methods, probability analysis, system theoretic, epidemic theory, vulnerability evaluation, and graph based . Hong et al defined attacking behavior using UML language.…”
Section: Background Studymentioning
confidence: 99%
See 4 more Smart Citations
“…Several attack models have been designed for WSN that exploits different vulnerabilities present in the network. The attacking models are based on several approaches namely UML methods, probability analysis, system theoretic, epidemic theory, vulnerability evaluation, and graph based . Hong et al defined attacking behavior using UML language.…”
Section: Background Studymentioning
confidence: 99%
“… Network modelWSN is presented as a graph G in which the vertex is the sensor node and edges are secure links between the communicating nodes of the network. The nodes are configured with random key predistribution in which 2 neighboring nodes can communicate only if they have a common key in their key ring Path modelVarious routing paths are formed between the source and sink nodes in a network.…”
Section: System Modelsmentioning
confidence: 99%
See 3 more Smart Citations