Title :
Secure & robust RED (SR-RED)
Author :
Khan, Wazir Zada ; Aalsalem, Mohammed Y. ; Saad, Mohamad Naufal Mohamad
Author_Institution :
Electr. & Electron. Eng. Dept., Univ. Teknol. PETRONAS, Tronoh, Malaysia
Abstract :
In the security of wireless sensor networks, node replication attack is the most critical concern. In node replication attack, an adversary compromises the captured node and replicates the node, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch many insidious attacks within the sensor network. So far, Randomized, Efficient and Distributed (RED) is considered to be the most promising distributed solution for detecting clone nodes but it also has some stern, stunning and uncompromising shortcomings. The contributions of this paper are twofold. First, we have presented a distributed and non-deterministic solution, removing the drawbacks of RED by making enhancements in order to identify and revoke clones. Finally, we have proposed a method for the detection of masked replication attack which is another form or variation of Node replication attack.
Keywords :
cryptographic protocols; wireless sensor networks; RED protocol; clone node detection; distributed solution; insidious attacks; masked replication attack; node replication attack; nondeterministic solution; randomized efficient distributed protocol; wireless sensor network security; Base stations; Cloning; Monitoring; Protocols; Security; Synchronization; Wireless sensor networks; Clones and Replicas Detection; Masked Replication Attack; Node Replication Attack; Security; Wireless Sensor Networks;
Conference_Titel :
Telecommunications (ICT), 2013 20th International Conference on
Conference_Location :
Casablanca
Print_ISBN :
978-1-4673-6425-6
DOI :
10.1109/ICTEL.2013.6632118