2015
DOI: 10.3390/jsan4040378
|View full text |Cite
|
Sign up to set email alerts
|

The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks

Abstract: A node replication attack against a wireless sensor network involves surreptitious efforts by an adversary to insert duplicate sensor nodes into the network while avoiding detection. Due to the lack of tamper-resistant hardware and the low cost of sensor nodes, launching replication attacks takes little effort to carry out. Naturally, detecting these replica nodes is a very important task and has been studied extensively. In this paper, we propose a novel distributed, randomized sensor duplicate detection algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 37 publications
(81 reference statements)
0
4
0
Order By: Relevance
“…Clone attacks have attracted the attention of researchers, and there has been much effort on clone detection up to now [5][6][7][8][9][10][11][12][13][14][15][16][17][18]. According to different features, we could classify them into different categories: centralized [12][13][14][15] or distributed [5][6][7][8][9][10][11][16][17][18], witness-based [5,[8][9][10][11][16][17][18] or not, position dependent [5, 8-11, 17, 18] or not, and the scheme is for randomly deployed [5][6][7][8][9][10][11][12][13][14][15][16] or group-deployed networks…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Clone attacks have attracted the attention of researchers, and there has been much effort on clone detection up to now [5][6][7][8][9][10][11][12][13][14][15][16][17][18]. According to different features, we could classify them into different categories: centralized [12][13][14][15] or distributed [5][6][7][8][9][10][11][16][17][18], witness-based [5,[8][9][10][11][16][17][18] or not, position dependent [5, 8-11, 17, 18] or not, and the scheme is for randomly deployed [5][6][7][8][9][10][11][12][13][14][15][16] or group-deployed networks…”
Section: Related Workmentioning
confidence: 99%
“…However, the shortcomings are also explicit: the BS easily suffers from a single point of failure and the nodes around the BS consume much more energy than others due to forwarding packets. In order to solve these problems, distributed schemes are proposed [5][6][7][8][9][10][11][16][17][18], which assign the detection tasks to different areas and nodes, yet the resource consumptions of nodes are increasing sharply. Most of the works are conducted to balance the detection probability and the resource expenditure.…”
Section: Related Workmentioning
confidence: 99%
“…In practical applications, sensor nodes are usually deployed in a harsh open environment, often lacking necessary physical protection. Moreover, the networks are generally not equipped with physical tamper-proof devices due to cost constraints [5] . Therefore, the open nature of their environment and wireless communication expose the nodes to various security threats.…”
Section: Introductionmentioning
confidence: 99%
“…Most techniques proposed in the literature are intended for detection in the second and third stages. Such techniques include, for example, node redeployment location detection [9] , node clone detection [5,10] , selective forwarding attack detection [11] , black hole attack detection [12] , witch attack detection [13] , Denial of Service attack detection, and malicious data injection detection [14] . Node capture should be detected as soon as possible to reduce the damage caused by the captured nodes to the network.…”
Section: Introductionmentioning
confidence: 99%