• DocumentCode
    1728114
  • Title

    Deterministic detection of node replication attacks in sensor networks

  • Author

    Yu-Shen Ho ; Ruay-Lien Ma ; Cheng-En Sung ; I-Chen Tsai ; Li-Wei Kang ; Chia-Mu Yu

  • Author_Institution
    Yuan Ze Univ., Chungli, Taiwan
  • fYear
    2015
  • Firstpage
    468
  • Lastpage
    469
  • Abstract
    In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.
  • Keywords
    multicast communication; telecommunication security; wireless sensor networks; deterministic detection; node replication attacks; quorum-based multicast; star-shape line-selected multicast; wireless sensor networks; Cloning; Hardware; Mobile communication; Probabilistic logic; Protocols; Security; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference on
  • Conference_Location
    Taipei
  • Type

    conf

  • DOI
    10.1109/ICCE-TW.2015.7217002
  • Filename
    7217002