2017
DOI: 10.3390/s17010160
|View full text |Cite
|
Sign up to set email alerts
|

Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Abstract: Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…At present, the network failure caused by node attacks is a hot topic in research. Ding et al [17] proposed a location-based a similarity detection scheme using deployment knowledge in wireless sensor networks to solve network attacks that generate replication nodes due to being unattended; In addition to focusing on the physical connection topology of SBIN, the study on the invulnerability of SBIN also needs to focus on the other network attributes, such as the degree distribution, betweenness, clustering coefficient, and so on [18][19][20]. It is of great value to grasp these characteristics and rules.…”
Section: Related Workmentioning
confidence: 99%
“…At present, the network failure caused by node attacks is a hot topic in research. Ding et al [17] proposed a location-based a similarity detection scheme using deployment knowledge in wireless sensor networks to solve network attacks that generate replication nodes due to being unattended; In addition to focusing on the physical connection topology of SBIN, the study on the invulnerability of SBIN also needs to focus on the other network attributes, such as the degree distribution, betweenness, clustering coefficient, and so on [18][19][20]. It is of great value to grasp these characteristics and rules.…”
Section: Related Workmentioning
confidence: 99%
“…Many algorithms such as [6][7][8][9] have been proposed to identify the replica nodes in stationary WSNs. However, these algorithms cannot be employed in mobile WSNs, since most of them rely on transmitting location claims to witness nodes or specific places in the network, or they are particularly designed for some specific topologies.…”
Section: International Journal On Informatics Visualization Vol 3 (20mentioning
confidence: 99%
“…Ding et al [8] used similarity estimation with group deployment knowledge to detect cloned nodes in WSNs. They prevent replicas from generating false location claims without deploying localization techniques on the sensor nodes.…”
Section: A Related Workmentioning
confidence: 99%
“…Clone attacks have attracted the attention of researchers, and there has been much effort on clone detection up to now [5][6][7][8][9][10][11][12][13][14][15][16][17][18]. According to different features, we could classify them into different categories: centralized [12][13][14][15] or distributed [5][6][7][8][9][10][11][16][17][18], witness-based [5,[8][9][10][11][16][17][18] or not, position dependent [5, 8-11, 17, 18] or not, and the scheme is for randomly deployed [5][6][7][8][9][10][11][12][13][14][15][16] or group-deployed networks…”
Section: Related Workmentioning
confidence: 99%