2013
DOI: 10.1155/2013/745069
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are composed of numerous low-cost, low-power sensor nodes communicating at short distance through wireless links. Sensors are densely deployed to collect and transmit data of the physical world to one or few destinations called the sinks. Because of open deployment in hostile environment and the use of low-cost materials, powerful adversaries could capture them to extract sensitive information (encryption keys, identities, addresses, etc.). When nodes may be compromised, "beyond… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…In the study by Znaidi et al [22] a mechanism based on a three-tier hierarchical network structure was used. The principle of the scheme is based on the use of a Bloom filter.…”
Section: Related Workmentioning
confidence: 99%
“…In the study by Znaidi et al [22] a mechanism based on a three-tier hierarchical network structure was used. The principle of the scheme is based on the use of a Bloom filter.…”
Section: Related Workmentioning
confidence: 99%
“…In this attack, malicious node captures the ID of the legitimate node, and then it uses for communication purposes to obtain the confidential information. Controlling this situation, randomized, efficient, and distributed (RED) [51], bypassing neighbor-based detection (BND) [52], distributed detection (DD) [53], and hierarchical node replication attacks detection (HNRAD) [54] were proposed. These approaches help identify the inserted legitimate node in the network.…”
Section: Threats At the Mac Layermentioning
confidence: 99%
“…Each sensor node has a unique ID and is identified by its ID in the network. Most of the replica detection mechanisms described by authors in [6], [8] relies on ID based signature techniques for node authentication. With the adoption of ID based techniques, the attacker can not associate new ID with the sensor node due to the fact that each node's private/public key pair is bind to its node Id.…”
Section: Related Workmentioning
confidence: 99%
“…A hierarchical distributed scheme to detect replicated nodes in the clusters by employing bloom filter mechanisms is outlined in [8]. The cluster heads selection is performed by (LNCA) clustering protocol.…”
Section: Cluster Based Approachmentioning
confidence: 99%
See 1 more Smart Citation