Deterministic detection of node replication attacks in sensor networks

Yu Shen Ho, Ruay Lien Ma, Cheng En Sung, I. Chen Tsai, Li Wei Kang, Chia Mu Yu

研究成果: Conference contribution同行評審

3 引文 斯高帕斯(Scopus)

摘要

In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.

原文English
主出版物標題2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
發行者Institute of Electrical and Electronics Engineers Inc.
頁面468-469
頁數2
ISBN(電子)9781479987443
DOIs
出版狀態Published - 20 八月 2015
事件2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 - Taipei, Taiwan
持續時間: 6 六月 20158 六月 2015

出版系列

名字2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015

Conference

Conference2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
國家/地區Taiwan
城市Taipei
期間6/06/158/06/15

指紋

深入研究「Deterministic detection of node replication attacks in sensor networks」主題。共同形成了獨特的指紋。

引用此