Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2007
DOI: 10.1145/1288107.1288119
|View full text |Cite
|
Sign up to set email alerts
|

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks

Abstract: Wireless sensor networks are often deployed in hostile environments, where anadversary can physically capture some of the nodes. Once a node is captured, the attackercan re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been proposed. However, these solutions are not satisfactory. First, they are energy and memo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
159
0
2

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 166 publications
(162 citation statements)
references
References 40 publications
(46 reference statements)
1
159
0
2
Order By: Relevance
“…In this section, we demonstrate the security and performance of our proposed approach compared with RED [3], and LM [4]. First, to assess the robustness against node compromise attack, we measured P r by increasing the number of compromised nodes, which are intelligently selected in each scheme: In RED [3], the nodes are located in the center of the network and are highly likely to be intermediate nodes on every communication path.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we demonstrate the security and performance of our proposed approach compared with RED [3], and LM [4]. First, to assess the robustness against node compromise attack, we measured P r by increasing the number of compromised nodes, which are intelligently selected in each scheme: In RED [3], the nodes are located in the center of the network and are highly likely to be intermediate nodes on every communication path.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Mauro et al [3] proposed RED (Randomized, Efficient, and Distributed Protocol), which requires all sensors to be synchronized with a Base Station (BS) and have the same random value at a certain time through periodic broadcast beacons. To determine a witness point randomly, each node uses the pseudo random function, which takes in the id of a node and the current random value.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(these methods can only be used in static network) Several software-based clone attack detection schemes have been proposed for sensor networks [7], [11]. The main idea of these schemes is to let each node report its locations and attempt to find conflicting reports that one node resides in multiple locations.…”
Section: Related Workmentioning
confidence: 99%
“…With the development of wireless sensor networks, building a wireless sensor networks requires suitable security protocols [3]. Replication attack (or clone attack) is a common attack mode in WSNs [4]- [5]. Replicas can launch a variety of attacks such as creating a black hole or initiating a wormhole attack [6]- [8].…”
Section: Introductionmentioning
confidence: 99%