2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) 2015
DOI: 10.1109/pccc.2015.7410341
|View full text |Cite
|
Sign up to set email alerts
|

Replication attack detection with monitor nodes in clustered wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…High and successful detection probability is the most significant performance metric for any clone detection protocol. However, most of the proposed clone detection protocols suffer from low detection probability with high cost in terms of communication and memory [29], [33], [36], [38], [41], [56], [58]. This study concludes that ''Detection Probability'', with a frequency of 20.59%, can be regarded as the third-significant challenge in the clone node detection mechanism.…”
Section: ) Detection Probabilitymentioning
confidence: 89%
“…High and successful detection probability is the most significant performance metric for any clone detection protocol. However, most of the proposed clone detection protocols suffer from low detection probability with high cost in terms of communication and memory [29], [33], [36], [38], [41], [56], [58]. This study concludes that ''Detection Probability'', with a frequency of 20.59%, can be regarded as the third-significant challenge in the clone node detection mechanism.…”
Section: ) Detection Probabilitymentioning
confidence: 89%
“…Khedim et al [25] proposed a protocol that aims to mitigate the independence of the GPS and beacon node. MCD refers to a hybrid protocol that uses patrol robots and honeypots for detecting replicated nodes in a static sensor network, but this method needs more deployment cost as the hardware included is highly expensive.…”
Section: Related Workmentioning
confidence: 99%
“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”
Section: Security Threat In Clustered Wireless Sensor Networkmentioning
confidence: 99%