2012
DOI: 10.1049/iet-wss.2011.0064
|View full text |Cite
|
Sign up to set email alerts
|

Node capture attack detection and defence in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(31 citation statements)
references
References 24 publications
0
30
0
Order By: Relevance
“…In this section we made a survey on the traditional algorithm like AES, DES, 3DES, blowfish algorithm and made a comparison among them based on the basic features like key size, block size, number of rounds taken to encrypt or decrypt the data by those algorithm as well as we highlighted the cryptanalysis attacks which are able to break the security of those algorithms . [17] to eliminate the probabilities of node compromise and node capture attacks in wireless sensor networks. Based on two major block elements i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In this section we made a survey on the traditional algorithm like AES, DES, 3DES, blowfish algorithm and made a comparison among them based on the basic features like key size, block size, number of rounds taken to encrypt or decrypt the data by those algorithm as well as we highlighted the cryptanalysis attacks which are able to break the security of those algorithms . [17] to eliminate the probabilities of node compromise and node capture attacks in wireless sensor networks. Based on two major block elements i.e.…”
Section: Introductionmentioning
confidence: 99%
“…The authors proposed [12] the SCADD protocol for node capture attack detection and defense in WSN. SCADD gives a cost-effective solution against the node capture attacks in WSNs, increases the security of WSN for security-sensitive applications.…”
Section: Survey Of Various Detection and Key Predistribution Schemes mentioning
confidence: 99%
“…Though a node pretends to be a forgery CA and issues certificates with Q CA , eventually the fake certificates and public keys are disclosed during the key establishment phase (i.e., calculating K U V = d U Q V ). We assume that the CH can identify compromised nodes using beacon message technique, as explained in references [9] and [4]. Then the CA will broadcast the compromised node ID to the non-compromised nodes.…”
Section: Node Compromise Attacksmentioning
confidence: 99%
“…Sensor nodes can reach the corresponding CH by single or multiple hops. Finally, physical node capturing attacks are to be identified by beacon messages as explained in references [9] and [4]. When one node is compromised the CH will identify it and broadcast its ID to the cluster.…”
Section: B Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation