DocumentCode :
1728114
Title :
Deterministic detection of node replication attacks in sensor networks
Author :
Yu-Shen Ho ; Ruay-Lien Ma ; Cheng-En Sung ; I-Chen Tsai ; Li-Wei Kang ; Chia-Mu Yu
Author_Institution :
Yuan Ze Univ., Chungli, Taiwan
fYear :
2015
Firstpage :
468
Lastpage :
469
Abstract :
In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.
Keywords :
multicast communication; telecommunication security; wireless sensor networks; deterministic detection; node replication attacks; quorum-based multicast; star-shape line-selected multicast; wireless sensor networks; Cloning; Hardware; Mobile communication; Probabilistic logic; Protocols; Security; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference on
Conference_Location :
Taipei
Type :
conf
DOI :
10.1109/ICCE-TW.2015.7217002
Filename :
7217002
Link To Document :
بازگشت